Analysis

  • max time kernel
    117s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2023, 17:49

General

  • Target

    NEAS.2b2ad0f6a1b5196bb333c33e465a3e50.exe

  • Size

    144KB

  • MD5

    2b2ad0f6a1b5196bb333c33e465a3e50

  • SHA1

    1a8281cf60874dbe8732cf7b85c088b18176e16d

  • SHA256

    84c03321c8212d6d8f7465c66f1bf54288081101bfd3968dda5834d20ad208aa

  • SHA512

    12378150a5461d093dcaacd9645570db1f7b14c515bc07d18ef2ba26c4abc016e98a1f7bd58fe5143785e7fa59af793be4dfd7791860e1fd1b25ec7c0fc32335

  • SSDEEP

    3072:AGMohJ718OEiNBP718rBrBQyizKgtFJlsmi3:LhJ58OdV7CFiyiWC6mi3

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.2b2ad0f6a1b5196bb333c33e465a3e50.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.2b2ad0f6a1b5196bb333c33e465a3e50.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2472
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {3180606F-9577-4515-8174-2E95068A71E5} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\PROGRA~3\Mozilla\zlzghad.exe
      C:\PROGRA~3\Mozilla\zlzghad.exe -pmcpovi
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:2604

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\PROGRA~3\Mozilla\zlzghad.exe

          Filesize

          144KB

          MD5

          fdfbe6162f097d8daac921cd27e83669

          SHA1

          f7320d27f989115866c54b5e5325af769f705c1f

          SHA256

          05167b7f957ff3a3d92da58a9431e12dc65903048f6101cfe61be40d02e0975f

          SHA512

          32abd6a0f98be65605c77cf9e7eeeb8a7dadca132f616430dcc4f4a5235dd4fed5dce9bf2a24392c0a36d98a570659db56c92465ef5f728ae95025a297643782

        • C:\PROGRA~3\Mozilla\zlzghad.exe

          Filesize

          144KB

          MD5

          fdfbe6162f097d8daac921cd27e83669

          SHA1

          f7320d27f989115866c54b5e5325af769f705c1f

          SHA256

          05167b7f957ff3a3d92da58a9431e12dc65903048f6101cfe61be40d02e0975f

          SHA512

          32abd6a0f98be65605c77cf9e7eeeb8a7dadca132f616430dcc4f4a5235dd4fed5dce9bf2a24392c0a36d98a570659db56c92465ef5f728ae95025a297643782

        • memory/2472-0-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2472-1-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2472-2-0x00000000001B0000-0x00000000001B1000-memory.dmp

          Filesize

          4KB

        • memory/2472-3-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2472-7-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2604-10-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2604-11-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2604-15-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB