Analysis
-
max time kernel
119s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
05/11/2023, 23:53
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.5a4bb23f3e92bba8057c828c896d8660.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.5a4bb23f3e92bba8057c828c896d8660.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.5a4bb23f3e92bba8057c828c896d8660.exe
-
Size
126KB
-
MD5
5a4bb23f3e92bba8057c828c896d8660
-
SHA1
6250b9e1d90cfb7a342341469e77de739113a8e4
-
SHA256
8c90d5aab60e63a5cbb791226140536da21b5c95035d2f7dbbb892e598618dbd
-
SHA512
470fea8cab8aee12d50f1fa691d92f46945b0db53e6a9a57d8ff21869f993b1082279094bed75f26611092b0aec238d5298eac6bc0af46afa2ebbceac16d5bef
-
SSDEEP
1536:JBBHjvgESHlHPUoQWJAn7W+izHlcj4p5LxOzAfGFmGI5zN+MmJz5lbQpRKYS9Pix:/BHjoESlHPAnC55cQDkjmGtlD2Y5j5g
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2788 ajahmjj.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\ajahmjj.exe NEAS.5a4bb23f3e92bba8057c828c896d8660.exe File created C:\PROGRA~3\Mozilla\ghzyxbm.dll ajahmjj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2788 2924 taskeng.exe 29 PID 2924 wrote to memory of 2788 2924 taskeng.exe 29 PID 2924 wrote to memory of 2788 2924 taskeng.exe 29 PID 2924 wrote to memory of 2788 2924 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5a4bb23f3e92bba8057c828c896d8660.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5a4bb23f3e92bba8057c828c896d8660.exe"1⤵
- Drops file in Program Files directory
PID:2032
-
C:\Windows\system32\taskeng.exetaskeng.exe {9090C217-37BB-4417-B122-43D9BB95FF93} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\PROGRA~3\Mozilla\ajahmjj.exeC:\PROGRA~3\Mozilla\ajahmjj.exe -mngyzad2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD5874414f3b5d766e2a362bffa0598d516
SHA156d36cb257516c0f30486451e6c82f3d62ad5133
SHA25661e9776a356da6cbbee215f3a09a3d57ba77a0fbf4bc9c26ebbb4e6744bb533e
SHA51238d12eeb39d458d2a1105d36b04064fd6af22a9b80f972169726125e67237b7e0fa3aa9bb0a619af439df86e3a4647611177bf4d88b3973b703d158024557c2c
-
Filesize
126KB
MD5874414f3b5d766e2a362bffa0598d516
SHA156d36cb257516c0f30486451e6c82f3d62ad5133
SHA25661e9776a356da6cbbee215f3a09a3d57ba77a0fbf4bc9c26ebbb4e6744bb533e
SHA51238d12eeb39d458d2a1105d36b04064fd6af22a9b80f972169726125e67237b7e0fa3aa9bb0a619af439df86e3a4647611177bf4d88b3973b703d158024557c2c