Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 18:03
Behavioral task
behavioral1
Sample
NEAS.80cc7d12773e555aedb47d9041317b20.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.80cc7d12773e555aedb47d9041317b20.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.80cc7d12773e555aedb47d9041317b20.exe
-
Size
365KB
-
MD5
80cc7d12773e555aedb47d9041317b20
-
SHA1
7f96ef384e1aedd25676b37c60188c6e3c47a4aa
-
SHA256
5dc4c5808ceb622d7a978d2cd41fe6981686e3e509116be06ecbd8bb76aad659
-
SHA512
f1a77a278f9b92871017118db580719b866e563992a0b2f6fff3aabcd8f606af47843e3fcaef89cb9000013b44b5b0baadbd51ca2656f87cfe4e625f59493d7b
-
SSDEEP
3072:R4wsgTsDAJJRjONJQcwAOwzy8f1StC4SZmGTLFZhh2D+0caj3kyRACE2d:R4wNJJOJflpd46ZLn9ozE2d
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2412 znwkgzk.exe -
resource yara_rule behavioral1/memory/2228-0-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/files/0x000a000000012243-6.dat upx behavioral1/files/0x000a000000012243-7.dat upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\znwkgzk.exe NEAS.80cc7d12773e555aedb47d9041317b20.exe File created C:\PROGRA~3\Mozilla\cskihnk.dll znwkgzk.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2228 NEAS.80cc7d12773e555aedb47d9041317b20.exe 2412 znwkgzk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2412 3004 taskeng.exe 29 PID 3004 wrote to memory of 2412 3004 taskeng.exe 29 PID 3004 wrote to memory of 2412 3004 taskeng.exe 29 PID 3004 wrote to memory of 2412 3004 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.80cc7d12773e555aedb47d9041317b20.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.80cc7d12773e555aedb47d9041317b20.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2228
-
C:\Windows\system32\taskeng.exetaskeng.exe {50BC4F54-AB11-4850-B41C-A7A0CB6C2A32} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\PROGRA~3\Mozilla\znwkgzk.exeC:\PROGRA~3\Mozilla\znwkgzk.exe -nfwatvg2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
365KB
MD5bc06a3475f7615622e86460d96785d89
SHA199846b197c07e4b9fbd09d53861cc368601894cc
SHA2566b8b50fa93d56bb6e1a6b6d65b84177855f8fadb1394b47321f645c27f5458ce
SHA512309d4eaf2d0d00575be9b3d257b70f413dbd73634708684ec5838516f1b1762d8070205a07085141dc1a0193e0398d372f2768aaf00149a4d94f74b9e89b9398
-
Filesize
365KB
MD5bc06a3475f7615622e86460d96785d89
SHA199846b197c07e4b9fbd09d53861cc368601894cc
SHA2566b8b50fa93d56bb6e1a6b6d65b84177855f8fadb1394b47321f645c27f5458ce
SHA512309d4eaf2d0d00575be9b3d257b70f413dbd73634708684ec5838516f1b1762d8070205a07085141dc1a0193e0398d372f2768aaf00149a4d94f74b9e89b9398