Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16/10/2023, 18:23
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.6784020cef63a1f213cd60952c2add30.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.6784020cef63a1f213cd60952c2add30.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.6784020cef63a1f213cd60952c2add30.exe
-
Size
145KB
-
MD5
6784020cef63a1f213cd60952c2add30
-
SHA1
1415a2ca1590718123caa759a949ff88a0c670e8
-
SHA256
3d2e20fad6185cdd4bb384118a1fe9ab4c78a3d9a256df77562e7fd0b2c1b337
-
SHA512
738acb6918d7ca2bfdbd302ba4ec62123094948d86d9b0cacc55d8c71de3c2285ea140e2ab09248d7393db5dbaf398f433a83fb0ef567a81ccfbbf7d11994bdf
-
SSDEEP
3072:+apQLsjnOYOKOpGQ2ly+4yHyisr7O8CMFPv3yJDUKb80vR:+aIsfQ28+4R7T5vrsXR
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2924 xvqykzi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\xvqykzi.exe NEAS.6784020cef63a1f213cd60952c2add30.exe File created C:\PROGRA~3\Mozilla\zyfdqqb.dll xvqykzi.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2924 1420 taskeng.exe 31 PID 1420 wrote to memory of 2924 1420 taskeng.exe 31 PID 1420 wrote to memory of 2924 1420 taskeng.exe 31 PID 1420 wrote to memory of 2924 1420 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6784020cef63a1f213cd60952c2add30.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6784020cef63a1f213cd60952c2add30.exe"1⤵
- Drops file in Program Files directory
PID:2088
-
C:\Windows\system32\taskeng.exetaskeng.exe {33C39520-7FFA-4B49-B139-35C92E1A76D7} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\PROGRA~3\Mozilla\xvqykzi.exeC:\PROGRA~3\Mozilla\xvqykzi.exe -tkarfve2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145KB
MD5b78e50a5ec7c0acd9137b02ca26b88b0
SHA1327a5d1b94952b6f94fbf7109abbab1227ad70fc
SHA2567de0ae8cc8e7d78762bb08023321ecf32d5470dfe4d48eb674a2b64288c77d44
SHA5129955493a06e4f3d9d2cd7fb6fcca38d230a7048b11b600d494cddfe0ccfcf610623a749838bccc9ad3af91291257273953e9e0e4dad30d6de2802a9e4ce890e9
-
Filesize
145KB
MD5b78e50a5ec7c0acd9137b02ca26b88b0
SHA1327a5d1b94952b6f94fbf7109abbab1227ad70fc
SHA2567de0ae8cc8e7d78762bb08023321ecf32d5470dfe4d48eb674a2b64288c77d44
SHA5129955493a06e4f3d9d2cd7fb6fcca38d230a7048b11b600d494cddfe0ccfcf610623a749838bccc9ad3af91291257273953e9e0e4dad30d6de2802a9e4ce890e9