Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
02/11/2023, 10:14
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.99fad649d9aa7a2c91dbd8a4326b8620_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.99fad649d9aa7a2c91dbd8a4326b8620_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.99fad649d9aa7a2c91dbd8a4326b8620_JC.exe
-
Size
256KB
-
MD5
99fad649d9aa7a2c91dbd8a4326b8620
-
SHA1
3360a8c7c10bd216da9fcfc162523d74c06f41ca
-
SHA256
85749c2f695c8e3634b0d12cf7b6e507aa9694e9c5a92581dad4a054ccd32b9a
-
SHA512
ec4e9a446f805ec9aa912abf7d9abca2d9e2bd70dffab8f1f2728504afd559c43a376e35b28af1854716c949b7195683be4dfa90bf2cada6a39b15c5655ab71d
-
SSDEEP
6144:dFZOSgIhBBQERJpJBQHEJVLiRz96fUjt3:Lo4vQ4JWHLz96y
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2692 zimfrwc.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\zimfrwc.exe NEAS.99fad649d9aa7a2c91dbd8a4326b8620_JC.exe File created C:\PROGRA~3\Mozilla\pjqvbbf.dll zimfrwc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1336 wrote to memory of 2692 1336 taskeng.exe 29 PID 1336 wrote to memory of 2692 1336 taskeng.exe 29 PID 1336 wrote to memory of 2692 1336 taskeng.exe 29 PID 1336 wrote to memory of 2692 1336 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.99fad649d9aa7a2c91dbd8a4326b8620_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.99fad649d9aa7a2c91dbd8a4326b8620_JC.exe"1⤵
- Drops file in Program Files directory
PID:2476
-
C:\Windows\system32\taskeng.exetaskeng.exe {F7622D47-6EAF-46A1-B936-FC5BA3D11E9B} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\PROGRA~3\Mozilla\zimfrwc.exeC:\PROGRA~3\Mozilla\zimfrwc.exe -gtjzibe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD58a5e64d3883df27befbc637ea1290e55
SHA10886e019077952e3b9967ea2f009633e49d1cf78
SHA256273094b3e4c660fbea45170d82576df18439110f8875c43fd7d11ef468e4b3c2
SHA51258f3c7d63be306ccfe533304fc8768f1753d50fe1a6b55f7941e06f71f9efbaf287c832f9ca51068a4865022afb898332ad919d8d7498119d2add0c52aaa882c
-
Filesize
256KB
MD58a5e64d3883df27befbc637ea1290e55
SHA10886e019077952e3b9967ea2f009633e49d1cf78
SHA256273094b3e4c660fbea45170d82576df18439110f8875c43fd7d11ef468e4b3c2
SHA51258f3c7d63be306ccfe533304fc8768f1753d50fe1a6b55f7941e06f71f9efbaf287c832f9ca51068a4865022afb898332ad919d8d7498119d2add0c52aaa882c