Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 14:21
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d55b18c75ff974f35c80231c912fb030.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.d55b18c75ff974f35c80231c912fb030.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.d55b18c75ff974f35c80231c912fb030.exe
-
Size
149KB
-
MD5
d55b18c75ff974f35c80231c912fb030
-
SHA1
378c3b9257204ac343bf9848cc1fa16066dcf262
-
SHA256
e41418e122b5e4bd0b547c1f04f07505882344545b52019460ae307811ec03aa
-
SHA512
8dd879a38e93d6c0bf212a71be765c424697120cf98fbe9a2bdc17bbf8d9474339f1b267cc9b671217e16e4e1275cea76dac00f5b0b804da47c93d99b042ff9f
-
SSDEEP
3072:7jQTRuqkO3ONdZR4bVcyCq6F2N431v/MepeTP6NyGDtB8YPas2AB+sF:aRuqp+NdZR4sFMeG6MGDtV2YF
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1260 suvkbwn.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\suvkbwn.exe NEAS.d55b18c75ff974f35c80231c912fb030.exe File created C:\PROGRA~3\Mozilla\wfwcssm.dll suvkbwn.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2252 NEAS.d55b18c75ff974f35c80231c912fb030.exe 1260 suvkbwn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 1260 2236 taskeng.exe 29 PID 2236 wrote to memory of 1260 2236 taskeng.exe 29 PID 2236 wrote to memory of 1260 2236 taskeng.exe 29 PID 2236 wrote to memory of 1260 2236 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d55b18c75ff974f35c80231c912fb030.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d55b18c75ff974f35c80231c912fb030.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2252
-
C:\Windows\system32\taskeng.exetaskeng.exe {3F43E005-5C78-4B65-A132-5322506EB33D} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\PROGRA~3\Mozilla\suvkbwn.exeC:\PROGRA~3\Mozilla\suvkbwn.exe -tlhykym2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149KB
MD5aa82bdfeabb81e7cb52556da117599f3
SHA1b41c7f77b313feee2f0b9d4f7b448b85a15ead61
SHA256c60938db912e22e58b4d5765ac56638c114918d5207dcba8626f390bfa16f14d
SHA51298f2b7e5aee72e3a3d5d3a74070d07f18b725932d8d10114927776c6628e131883af589239dd809e7f083109193510b9eecadc483174e8707b74b2101a6839ec
-
Filesize
149KB
MD5aa82bdfeabb81e7cb52556da117599f3
SHA1b41c7f77b313feee2f0b9d4f7b448b85a15ead61
SHA256c60938db912e22e58b4d5765ac56638c114918d5207dcba8626f390bfa16f14d
SHA51298f2b7e5aee72e3a3d5d3a74070d07f18b725932d8d10114927776c6628e131883af589239dd809e7f083109193510b9eecadc483174e8707b74b2101a6839ec