Analysis
-
max time kernel
14s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05-07-2024 00:55
Behavioral task
behavioral1
Sample
9ec956c1571dd0d6928d54b4cc230274ae7d1759feba150a7eb8425e55cf336a.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9ec956c1571dd0d6928d54b4cc230274ae7d1759feba150a7eb8425e55cf336a.exe
Resource
win10v2004-20240704-en
General
-
Target
9ec956c1571dd0d6928d54b4cc230274ae7d1759feba150a7eb8425e55cf336a.exe
-
Size
205KB
-
MD5
1fcb07efeb20aabe8223e46ebdb48cde
-
SHA1
f10ed073debd460083174749cac9e64c6b1b5fd9
-
SHA256
9ec956c1571dd0d6928d54b4cc230274ae7d1759feba150a7eb8425e55cf336a
-
SHA512
197cb0b9bb8d8a178ae58aa535a2b23dbd9be891ee8c2c96ef6f6fd72affb4117bb501e1f0b68b0157b8968d5c5e0cbc17c421ec28f269a2f83f512620477bf8
-
SSDEEP
3072:mbMDF8hw0ZbtC2aoaHSKLd1ZWZCZDP+RBqqAXV1o9DhlYJRkgor3rSjGKWGqpqjD:m1hwCbtC2atYZC9aqJhJPor3RLGqpX2
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Processes:
resource yara_rule C:\PROGRA~3\Mozilla\iqncgig.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
iqncgig.exepid process 2952 iqncgig.exe -
Drops file in Program Files directory 2 IoCs
Processes:
9ec956c1571dd0d6928d54b4cc230274ae7d1759feba150a7eb8425e55cf336a.exeiqncgig.exedescription ioc process File created C:\PROGRA~3\Mozilla\iqncgig.exe 9ec956c1571dd0d6928d54b4cc230274ae7d1759feba150a7eb8425e55cf336a.exe File created C:\PROGRA~3\Mozilla\buwmlrn.dll iqncgig.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
9ec956c1571dd0d6928d54b4cc230274ae7d1759feba150a7eb8425e55cf336a.exeiqncgig.exepid process 1512 9ec956c1571dd0d6928d54b4cc230274ae7d1759feba150a7eb8425e55cf336a.exe 2952 iqncgig.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 2412 wrote to memory of 2952 2412 taskeng.exe iqncgig.exe PID 2412 wrote to memory of 2952 2412 taskeng.exe iqncgig.exe PID 2412 wrote to memory of 2952 2412 taskeng.exe iqncgig.exe PID 2412 wrote to memory of 2952 2412 taskeng.exe iqncgig.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ec956c1571dd0d6928d54b4cc230274ae7d1759feba150a7eb8425e55cf336a.exe"C:\Users\Admin\AppData\Local\Temp\9ec956c1571dd0d6928d54b4cc230274ae7d1759feba150a7eb8425e55cf336a.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
-
C:\Windows\system32\taskeng.exetaskeng.exe {A28DA837-E35A-468A-A009-C43117860A9C} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\PROGRA~3\Mozilla\iqncgig.exeC:\PROGRA~3\Mozilla\iqncgig.exe -txnfdsi2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\PROGRA~3\Mozilla\iqncgig.exeFilesize
205KB
MD52b2357cb882c74039ae4966ffe1dc714
SHA1788e8d44e8d65981146c30b350ca2f5127b8cf8a
SHA256d5aa85ccf3eacc6ecaa22e7704029e3657de9f456a698037a92fe34e0d1e9e57
SHA51233a76da3214985292912c791649245e8294e027f4021ef683b773b1eae10b3205ee56aad850a18b0b15eb1ee03a0d585c516044cf9e807db23e7e158bef99edf
-
memory/1512-3-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/1512-0-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/1512-2-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/1512-4-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/1512-6-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/1512-1-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/2952-11-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/2952-10-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/2952-13-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/2952-12-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/2952-9-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/2952-15-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB