Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
02-11-2023 08:53
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0e63954735112ce4b0d63d7ece0949f0_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.0e63954735112ce4b0d63d7ece0949f0_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.0e63954735112ce4b0d63d7ece0949f0_JC.exe
-
Size
329KB
-
MD5
0e63954735112ce4b0d63d7ece0949f0
-
SHA1
f17087dad5aec81e9a56bfb6a16b19fe3176b534
-
SHA256
89678122a73bb2fa5e80e46b2eeedcf3f389fe260b23b91d91c53cb6d8efee4e
-
SHA512
642e75067f8ccd7f94f66dc6af58a9a2bec8c90b59c0246c01441cc4d5dc58261d587c618e6970a293265ceeb93fcc5a92210a65d1143417f2f5c8a51a151807
-
SSDEEP
6144:dFZOSgIhBBQERJpJBQHEJVLiRz96fUjt7vVOGhDRfFYnOOkw7:Lo4vQ4JWHLz96uvV5bqnOO1
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2640 wwljcul.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\wwljcul.exe NEAS.0e63954735112ce4b0d63d7ece0949f0_JC.exe File created C:\PROGRA~3\Mozilla\sdwojsn.dll wwljcul.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2640 3024 taskeng.exe 29 PID 3024 wrote to memory of 2640 3024 taskeng.exe 29 PID 3024 wrote to memory of 2640 3024 taskeng.exe 29 PID 3024 wrote to memory of 2640 3024 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.0e63954735112ce4b0d63d7ece0949f0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.0e63954735112ce4b0d63d7ece0949f0_JC.exe"1⤵
- Drops file in Program Files directory
PID:2192
-
C:\Windows\system32\taskeng.exetaskeng.exe {BD3F5CE3-9AE4-4D02-A6A3-93E1DA3F3358} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\PROGRA~3\Mozilla\wwljcul.exeC:\PROGRA~3\Mozilla\wwljcul.exe -anxczaj2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
329KB
MD54adabc9e134bf2a6834d531afcfbdf54
SHA1a7fda30ff69a8d4de2dc260ed28198d46ad4461c
SHA256d7f3b62260a6c84b8cea582fb33a276592a6e18dc75412e53830e603e4d77492
SHA5124ab45ade39779a903c954c7957ba5c787be844ad617196a61abd441b07f5a78af0514d66c2c4e40e1f6595c6a6ebfe0aebc57411ca47a8eed3b21a6feb21c7ff
-
Filesize
329KB
MD54adabc9e134bf2a6834d531afcfbdf54
SHA1a7fda30ff69a8d4de2dc260ed28198d46ad4461c
SHA256d7f3b62260a6c84b8cea582fb33a276592a6e18dc75412e53830e603e4d77492
SHA5124ab45ade39779a903c954c7957ba5c787be844ad617196a61abd441b07f5a78af0514d66c2c4e40e1f6595c6a6ebfe0aebc57411ca47a8eed3b21a6feb21c7ff