Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 17:57
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.6856213383478f6eb87a5870ccb16770.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.6856213383478f6eb87a5870ccb16770.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.6856213383478f6eb87a5870ccb16770.exe
-
Size
228KB
-
MD5
6856213383478f6eb87a5870ccb16770
-
SHA1
36171c6eebceacc7869be3f28eb3733418e89ea0
-
SHA256
4fc3845ed40811ea83668c46f66054618bf97ba6f48684ff51a78abb7e759269
-
SHA512
342ac51e7fba40e08f5b5f473b03ec7171c53d74c3fd678ca1c3cd34e95e3c4101ccc9a17cdbea17055bcb5a7c62821b2d9fbfadab81a46fa903c9bacf6e8bda
-
SSDEEP
3072:URtnaxdjv3SoCrKdKUUTNHY5Snf8TvHTxK3STrOdHa5S2jbxWGqJs8:dj8rKdKUUhHYE0T7ciXOdHa5SbGqJj
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2704 yzgwzlh.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\yzgwzlh.exe NEAS.6856213383478f6eb87a5870ccb16770.exe File created C:\PROGRA~3\Mozilla\jhnnyvm.dll yzgwzlh.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2712 NEAS.6856213383478f6eb87a5870ccb16770.exe 2704 yzgwzlh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2704 2660 taskeng.exe 30 PID 2660 wrote to memory of 2704 2660 taskeng.exe 30 PID 2660 wrote to memory of 2704 2660 taskeng.exe 30 PID 2660 wrote to memory of 2704 2660 taskeng.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6856213383478f6eb87a5870ccb16770.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6856213383478f6eb87a5870ccb16770.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2712
-
C:\Windows\system32\taskeng.exetaskeng.exe {C1F13003-591F-40E0-8B11-649B486546EF} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\PROGRA~3\Mozilla\yzgwzlh.exeC:\PROGRA~3\Mozilla\yzgwzlh.exe -chuvxnb2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD56250030955dec3666bd89fb01520f17d
SHA1c54884bf37c5689460da471059f1733795665821
SHA256f8bc7408993aa319c92952658e62913570757142911eec60d4179384c4601e09
SHA512f5246670c69129afc275be6a31111b320452fb7f8b0dd2c60a8b07630d7aa6122d5a459a383994abe013ae14c879d376db70aec15e06b243bc3d1b18ccc39859
-
Filesize
228KB
MD56250030955dec3666bd89fb01520f17d
SHA1c54884bf37c5689460da471059f1733795665821
SHA256f8bc7408993aa319c92952658e62913570757142911eec60d4179384c4601e09
SHA512f5246670c69129afc275be6a31111b320452fb7f8b0dd2c60a8b07630d7aa6122d5a459a383994abe013ae14c879d376db70aec15e06b243bc3d1b18ccc39859