Analysis

  • max time kernel
    122s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2023, 19:45

General

  • Target

    NEAS.17cbf65deefd27b799d0c2567657f970.exe

  • Size

    136KB

  • MD5

    17cbf65deefd27b799d0c2567657f970

  • SHA1

    50db2985f1bea8f651fa6c4da919724a15fca1d9

  • SHA256

    da0033023bc83a706bb47b5cf35147bd846117fd8117d29178396c7e8b9dd318

  • SHA512

    c5acd1b023e71166d642af0c7095d869267ce81222adf2f2f309780573cb8043cb5191faf8d0422a1189ff2ec2df8e20611d4904ad1e4613796e33cba4de5d48

  • SSDEEP

    3072:8rmggqf2wHNpV0g/oCrIFpAyAuW3Lv0HVzjds+Z3CLusowQY:8rzgO3tIg/YFp51JHZ3I1owj

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.17cbf65deefd27b799d0c2567657f970.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.17cbf65deefd27b799d0c2567657f970.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1624
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {35AEF2A3-B69F-420C-BAE4-2D93403F49B8} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\PROGRA~3\Mozilla\xvqykzi.exe
      C:\PROGRA~3\Mozilla\xvqykzi.exe -tkarfve
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:2664

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\PROGRA~3\Mozilla\xvqykzi.exe

          Filesize

          136KB

          MD5

          4036eff43e3a112e7a3f56885ac3c282

          SHA1

          d756591046d4f7e8f410edfa56fdf31f9b17bd47

          SHA256

          2e569290253ff6e1c838a17f62a6cc01660bd1d789746766d58d83dbfc894354

          SHA512

          8d3a01317c7ec5d0eeee0447269cab05e95dd4b723a5e8b5ce6de1acbb86b08f99129d026fddb424cfba54899c519d6d6d8f30247f63dfd8c609886ef231ee29

        • C:\PROGRA~3\Mozilla\xvqykzi.exe

          Filesize

          136KB

          MD5

          4036eff43e3a112e7a3f56885ac3c282

          SHA1

          d756591046d4f7e8f410edfa56fdf31f9b17bd47

          SHA256

          2e569290253ff6e1c838a17f62a6cc01660bd1d789746766d58d83dbfc894354

          SHA512

          8d3a01317c7ec5d0eeee0447269cab05e95dd4b723a5e8b5ce6de1acbb86b08f99129d026fddb424cfba54899c519d6d6d8f30247f63dfd8c609886ef231ee29

        • memory/1624-1-0x0000000000400000-0x000000000045D000-memory.dmp

          Filesize

          372KB

        • memory/1624-0-0x0000000000260000-0x0000000000261000-memory.dmp

          Filesize

          4KB

        • memory/1624-2-0x0000000000400000-0x000000000045D000-memory.dmp

          Filesize

          372KB

        • memory/1624-6-0x0000000000400000-0x000000000045D000-memory.dmp

          Filesize

          372KB

        • memory/1624-8-0x0000000000400000-0x000000000045D000-memory.dmp

          Filesize

          372KB

        • memory/2664-16-0x0000000000400000-0x000000000045D000-memory.dmp

          Filesize

          372KB