Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
28-10-2023 19:58
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.a707af2e896177f64c8439e7bdafc520.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.a707af2e896177f64c8439e7bdafc520.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.a707af2e896177f64c8439e7bdafc520.exe
-
Size
354KB
-
MD5
a707af2e896177f64c8439e7bdafc520
-
SHA1
734142a406ce34064e11b832b2ce2b0d26830f29
-
SHA256
5b387e90ce19c5820dac4857345f60d1241685cb56b38d83036559da9adfd6d3
-
SHA512
844bd9442a7637831881287ca2181f2d8bd9df5e4bd082501e5f04c2bffe20238da2043e98ec6b4d8db97c59b8af55608b244b76c569ee4d247defa061601577
-
SSDEEP
6144:CDJVazMKV31FdaQvXluxqU+A/0y+nt75voqQEnHv0CxN8H9RJPz7Dhzt/SaCMJ:CDJM/bXntAh+nhZoqQEHvVIzJPz//Dx
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2748 kymnayk.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\kymnayk.exe NEAS.a707af2e896177f64c8439e7bdafc520.exe File created C:\PROGRA~3\Mozilla\iuxrktg.dll kymnayk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1404 wrote to memory of 2748 1404 taskeng.exe 29 PID 1404 wrote to memory of 2748 1404 taskeng.exe 29 PID 1404 wrote to memory of 2748 1404 taskeng.exe 29 PID 1404 wrote to memory of 2748 1404 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.a707af2e896177f64c8439e7bdafc520.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.a707af2e896177f64c8439e7bdafc520.exe"1⤵
- Drops file in Program Files directory
PID:2124
-
C:\Windows\system32\taskeng.exetaskeng.exe {CD56670D-23EC-4A09-8E61-B851C1239BCA} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\PROGRA~3\Mozilla\kymnayk.exeC:\PROGRA~3\Mozilla\kymnayk.exe -dtmxjcd2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
354KB
MD50cb3b0e41a9fd3307548ee63c3d87937
SHA18996f6fe25878ddb47dbaa7d51993736ef571432
SHA2568d2cf60d046ec5b2af29421982384c018beedd8059cc3d7d0ab256ca8d04ed06
SHA5120dc8e306709dec885dd42a46b590228ec9ff2c1e581dbbe616615f4936b054e871778c7b5fdd92cc485c063ab3fe05411e45e02474a1f28d80a6e9818395da73
-
Filesize
354KB
MD50cb3b0e41a9fd3307548ee63c3d87937
SHA18996f6fe25878ddb47dbaa7d51993736ef571432
SHA2568d2cf60d046ec5b2af29421982384c018beedd8059cc3d7d0ab256ca8d04ed06
SHA5120dc8e306709dec885dd42a46b590228ec9ff2c1e581dbbe616615f4936b054e871778c7b5fdd92cc485c063ab3fe05411e45e02474a1f28d80a6e9818395da73