Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
03/11/2023, 00:03
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.3d40e68dd70f340105f284072375cb20_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.3d40e68dd70f340105f284072375cb20_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.3d40e68dd70f340105f284072375cb20_JC.exe
-
Size
197KB
-
MD5
3d40e68dd70f340105f284072375cb20
-
SHA1
a418a3691e691f457858df80d2e9b06e94c747cb
-
SHA256
be58c9ca46cbd4e7c25fa20a6c439d4c54feae1d16b080a61264569aa76ab612
-
SHA512
2e3403255cd6780ca6b9238299e6aa33e6e44493b714b61dce6b52b0392d5e77bde478f6160b896224d9dd7e1d9ef87e8869fe1e52a50b29d1345bc5b2a5a914
-
SSDEEP
3072:yhepkjr4O0cx158cZacNNc6eDmtH67gNdP/+nvfbYzHM5Et+ftE:yhepk34mL0+rJWvf0zHbtgE
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2704 zimfrwc.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\zimfrwc.exe NEAS.3d40e68dd70f340105f284072375cb20_JC.exe File created C:\PROGRA~3\Mozilla\pjqvbbf.dll zimfrwc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1372 wrote to memory of 2704 1372 taskeng.exe 31 PID 1372 wrote to memory of 2704 1372 taskeng.exe 31 PID 1372 wrote to memory of 2704 1372 taskeng.exe 31 PID 1372 wrote to memory of 2704 1372 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.3d40e68dd70f340105f284072375cb20_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.3d40e68dd70f340105f284072375cb20_JC.exe"1⤵
- Drops file in Program Files directory
PID:1568
-
C:\Windows\system32\taskeng.exetaskeng.exe {AEB5F8A3-F7C2-497A-AC74-AD73E0C0C5AF} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\PROGRA~3\Mozilla\zimfrwc.exeC:\PROGRA~3\Mozilla\zimfrwc.exe -gtjzibe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD52ead6634eece1a3f22fb0d6043093803
SHA1072ba263966bc8f06a8bc2a5a8d659487051a674
SHA2565a02d4b350df7790a2945afdda2da86401fa62a91042b88b1ebef056e3164450
SHA51288c088c5a398fd77190a617a5c552f05d295d779e79320840cb3afebc52f9ae731e3396d3e6e4aae68bdf1162baabb2829e4a6fe109fbb317b561c18b727f5af
-
Filesize
197KB
MD52ead6634eece1a3f22fb0d6043093803
SHA1072ba263966bc8f06a8bc2a5a8d659487051a674
SHA2565a02d4b350df7790a2945afdda2da86401fa62a91042b88b1ebef056e3164450
SHA51288c088c5a398fd77190a617a5c552f05d295d779e79320840cb3afebc52f9ae731e3396d3e6e4aae68bdf1162baabb2829e4a6fe109fbb317b561c18b727f5af