Analysis
-
max time kernel
123s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16/10/2023, 18:20
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.51ff5222a4b621b97516b5cf1204a640.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.51ff5222a4b621b97516b5cf1204a640.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.51ff5222a4b621b97516b5cf1204a640.exe
-
Size
221KB
-
MD5
51ff5222a4b621b97516b5cf1204a640
-
SHA1
8e6b36d5d91aede01e33f0cf62fce39b06af6871
-
SHA256
c39befb76a0bcb43bc8c2a937f1dfe85fe0de8bd6ffbcdb85c3668599a017337
-
SHA512
347d16413472621e5c3b2bf7ee02a70bf411068d22649f13ce6a76cddbe4091da0b343b568a69015cc5d48d6882225da89041d9d8589849dbe3f9de4b9533f32
-
SSDEEP
3072:A4CgWgTsDAJJRjOV2/pwb5ryT5tlDhB2IFTLFZhh2D+0caj3kyRACi6x:A4Cg3JJF35tlDhB2Cn9ozjx
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2556 jezwark.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jezwark.exe NEAS.51ff5222a4b621b97516b5cf1204a640.exe File created C:\PROGRA~3\Mozilla\gicylsk.dll jezwark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1708 NEAS.51ff5222a4b621b97516b5cf1204a640.exe 2556 jezwark.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2556 2168 taskeng.exe 29 PID 2168 wrote to memory of 2556 2168 taskeng.exe 29 PID 2168 wrote to memory of 2556 2168 taskeng.exe 29 PID 2168 wrote to memory of 2556 2168 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.51ff5222a4b621b97516b5cf1204a640.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.51ff5222a4b621b97516b5cf1204a640.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1708
-
C:\Windows\system32\taskeng.exetaskeng.exe {D1BD9B17-1566-4B2B-AE97-08DFBDC4CDA7} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\PROGRA~3\Mozilla\jezwark.exeC:\PROGRA~3\Mozilla\jezwark.exe -yvxgvyl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
221KB
MD510132ae5d23b2f987699c1f90578bac2
SHA1cda41eef79805cf4336cd3c9cee3949f09b64659
SHA256d244e9f5bec79595154725b4105d422374931111fea0ddd545a1f1f4aa540240
SHA512b4e465af75743c3eeb84e9d962ac7fa8d3f08e5472f490753dc07b18a75da7f4198ba6d7e57b93ccee849beb6c3a991105803e9bd563c0b6447b1f79f39f7fbb
-
Filesize
221KB
MD510132ae5d23b2f987699c1f90578bac2
SHA1cda41eef79805cf4336cd3c9cee3949f09b64659
SHA256d244e9f5bec79595154725b4105d422374931111fea0ddd545a1f1f4aa540240
SHA512b4e465af75743c3eeb84e9d962ac7fa8d3f08e5472f490753dc07b18a75da7f4198ba6d7e57b93ccee849beb6c3a991105803e9bd563c0b6447b1f79f39f7fbb