Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 09:55
Static task
static1
Behavioral task
behavioral1
Sample
dfbe7f7552b8b471fe4b17d4ff78fe9a78d16af4ca82b4e6643be22b19aa472a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
dfbe7f7552b8b471fe4b17d4ff78fe9a78d16af4ca82b4e6643be22b19aa472a.exe
Resource
win10v2004-20241007-en
General
-
Target
dfbe7f7552b8b471fe4b17d4ff78fe9a78d16af4ca82b4e6643be22b19aa472a.exe
-
Size
252KB
-
MD5
40d24eeab4bf0108ef85472b095c83f9
-
SHA1
1a9c823ae5f090063dd69697ecb5e4c423395d2a
-
SHA256
dfbe7f7552b8b471fe4b17d4ff78fe9a78d16af4ca82b4e6643be22b19aa472a
-
SHA512
7b025d7fc909d2a5f67f5e118f5a8d1c5fd38aa2fa9ffc2d6d5ebf5a97c17784c12c107b193e11c0d27b7f64580ad7b8e296bf4a304c46b12fac759f6d9a44cd
-
SSDEEP
6144:r7lNs03h33GBGyYWgBOhF9Oa5WfWNOSbGqJBHA:Hl3hGBGy7Vj9p4SW
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2268 unidtrd.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\soforsm.dll unidtrd.exe File created C:\PROGRA~3\Mozilla\unidtrd.exe dfbe7f7552b8b471fe4b17d4ff78fe9a78d16af4ca82b4e6643be22b19aa472a.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unidtrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfbe7f7552b8b471fe4b17d4ff78fe9a78d16af4ca82b4e6643be22b19aa472a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1728 dfbe7f7552b8b471fe4b17d4ff78fe9a78d16af4ca82b4e6643be22b19aa472a.exe 2268 unidtrd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1560 wrote to memory of 2268 1560 taskeng.exe 32 PID 1560 wrote to memory of 2268 1560 taskeng.exe 32 PID 1560 wrote to memory of 2268 1560 taskeng.exe 32 PID 1560 wrote to memory of 2268 1560 taskeng.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfbe7f7552b8b471fe4b17d4ff78fe9a78d16af4ca82b4e6643be22b19aa472a.exe"C:\Users\Admin\AppData\Local\Temp\dfbe7f7552b8b471fe4b17d4ff78fe9a78d16af4ca82b4e6643be22b19aa472a.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:1728
-
C:\Windows\system32\taskeng.exetaskeng.exe {5D0F4207-0415-4C9B-A42F-DB35959FEDBD} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\PROGRA~3\Mozilla\unidtrd.exeC:\PROGRA~3\Mozilla\unidtrd.exe -esjphrh2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5bff9cb77f7f231fad5c07d8ec7c0e508
SHA1c51a67f6aa4c85489dc0bf4c3e0e75392d30b3b4
SHA25623a80d138c832dd451799177e1b13e8116792a1ce803368cd2ebc64f6824b061
SHA512ea63d6c34d571330e2f6ed637b3b361fbccbbf269090b152fd7662604929f88fcca42411cf3590c2c3d3316a6e1e40ccb8c3e35e048355a17b9d6d2ee8ef1d0d