Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
01-11-2023 23:43
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.72481fd53a5282fb1f0ff737ad749610_JC.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.72481fd53a5282fb1f0ff737ad749610_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.72481fd53a5282fb1f0ff737ad749610_JC.exe
-
Size
327KB
-
MD5
72481fd53a5282fb1f0ff737ad749610
-
SHA1
38d903a3db603fa5f6daa08f01ff3f349df569d5
-
SHA256
10810b7f02a353b96a1e5a56de9c2ec66b736de8a8042eac3adf08fd57034544
-
SHA512
b08149161a3202a510b5583591a9137838376b93ed33928b79cff77a5faae5756670cf5ed4a42a20a66c5224f1a6892140da5df4d66edd24fd08d3ad46b864ac
-
SSDEEP
3072:xANA6IMfSLilGMXEVP79SE8pve/RysNPDuIvT4FBDv1KS2jbxWGqJsh:WiMF/X479SEAanPSIv0FB5KSbGqJO
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2656 kymnayk.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\kymnayk.exe NEAS.72481fd53a5282fb1f0ff737ad749610_JC.exe File created C:\PROGRA~3\Mozilla\iuxrktg.dll kymnayk.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2124 NEAS.72481fd53a5282fb1f0ff737ad749610_JC.exe 2656 kymnayk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2656 3056 taskeng.exe 29 PID 3056 wrote to memory of 2656 3056 taskeng.exe 29 PID 3056 wrote to memory of 2656 3056 taskeng.exe 29 PID 3056 wrote to memory of 2656 3056 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.72481fd53a5282fb1f0ff737ad749610_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.72481fd53a5282fb1f0ff737ad749610_JC.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2124
-
C:\Windows\system32\taskeng.exetaskeng.exe {6EE90A8D-6D8B-495A-BB7F-1543A8B30C80} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\PROGRA~3\Mozilla\kymnayk.exeC:\PROGRA~3\Mozilla\kymnayk.exe -dtmxjcd2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
327KB
MD5d9a1945c59e8811ce4ba98906743b006
SHA1db26099de4b76b8492f219780d0d4dfacc7e37b0
SHA25615587e04996e6009f3370d22c9598e438992accc7afc3319f4e3559a9af47775
SHA5120fab67ef5659959ccd763f146a04fa49cfc2d836968d7b3c2fa61eaf63b61c0d372d3e3df5c41fe7136be3683cb49f8fd229d92f83e6cba35a076147c9fa3973
-
Filesize
327KB
MD5d9a1945c59e8811ce4ba98906743b006
SHA1db26099de4b76b8492f219780d0d4dfacc7e37b0
SHA25615587e04996e6009f3370d22c9598e438992accc7afc3319f4e3559a9af47775
SHA5120fab67ef5659959ccd763f146a04fa49cfc2d836968d7b3c2fa61eaf63b61c0d372d3e3df5c41fe7136be3683cb49f8fd229d92f83e6cba35a076147c9fa3973