Analysis
-
max time kernel
117s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
03/11/2023, 07:17
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.e5dc7af7fa331685184ebe2099eead40_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.e5dc7af7fa331685184ebe2099eead40_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.e5dc7af7fa331685184ebe2099eead40_JC.exe
-
Size
155KB
-
MD5
e5dc7af7fa331685184ebe2099eead40
-
SHA1
f32ff48c3628ce84d5067a7fd9d11e1a1ee3ab99
-
SHA256
159eb154f4071afeabcc33cc6cacf0288137b8c1608939710f98154ed58b2aca
-
SHA512
0f800853dccc71adea02be3a62b8f0c433d255dbad62935bfaebdf48e5ec70ce485ad4c417ea65c3144f97a4e137abcc78ed1ec4f45e9d8a8919567c2d150eb3
-
SSDEEP
3072:zoY0ALG7F60AM6r61ZNSaPK8bbuVSQJ0uOUR5Y7DFavjBooD:0Y0ALG7HAMt1ZEs+NJ0rMYXwec
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1732 wwljcul.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\wwljcul.exe NEAS.e5dc7af7fa331685184ebe2099eead40_JC.exe File created C:\PROGRA~3\Mozilla\sdwojsn.dll wwljcul.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 1732 3012 taskeng.exe 29 PID 3012 wrote to memory of 1732 3012 taskeng.exe 29 PID 3012 wrote to memory of 1732 3012 taskeng.exe 29 PID 3012 wrote to memory of 1732 3012 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.e5dc7af7fa331685184ebe2099eead40_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e5dc7af7fa331685184ebe2099eead40_JC.exe"1⤵
- Drops file in Program Files directory
PID:3032
-
C:\Windows\system32\taskeng.exetaskeng.exe {1B6BB6C3-ED30-4BAC-A824-CD683F66594F} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\PROGRA~3\Mozilla\wwljcul.exeC:\PROGRA~3\Mozilla\wwljcul.exe -anxczaj2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
155KB
MD5de32c31d9dc39384746daa7bcb3b7a03
SHA16b1228232a347fa8302f98d981623b40b594b909
SHA2565fb375edea1d9ac7cef3e7dd9ed1fc88d4635ebba3fcedaf4707310e813adffe
SHA51225373b4e996a0e95acddbcf3d3f495f133b6b434ffe3e27d699a2d9f92d41561c2266a615a05bf11d5a21b51321ac98889678a9c8d4da902b1d87093667ecb12
-
Filesize
155KB
MD5de32c31d9dc39384746daa7bcb3b7a03
SHA16b1228232a347fa8302f98d981623b40b594b909
SHA2565fb375edea1d9ac7cef3e7dd9ed1fc88d4635ebba3fcedaf4707310e813adffe
SHA51225373b4e996a0e95acddbcf3d3f495f133b6b434ffe3e27d699a2d9f92d41561c2266a615a05bf11d5a21b51321ac98889678a9c8d4da902b1d87093667ecb12