Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    05/11/2023, 02:12

General

  • Target

    NEAS.b18d0f9c7ca3a9e16190d5540cdf7340_JC.exe

  • Size

    150KB

  • MD5

    b18d0f9c7ca3a9e16190d5540cdf7340

  • SHA1

    2082cfff973717b98503822abcbbf55d3b2028a2

  • SHA256

    9121d929344af6adf9a1dbdc43f4d20a3005aaddc350ceaa97033848f7a81429

  • SHA512

    e9d3a3e3f7175f4b1ae884a314979e21e140108d9f13e9dd3ee5c23776b9fa3999bdf4959b590bb39a3e6322416044b95c55d02b28fd283ce1ecd2b8fc17a9e0

  • SSDEEP

    3072:4kmdFupAeTTMlDdj3kFGwMTO9XS9nWNSwIvkI9q0cO:4kmmppUSF2TO982IZz

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.b18d0f9c7ca3a9e16190d5540cdf7340_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.b18d0f9c7ca3a9e16190d5540cdf7340_JC.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1968
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {01D28F48-2B37-468E-91F4-7FFB801768B7} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\PROGRA~3\Mozilla\ajahmjj.exe
      C:\PROGRA~3\Mozilla\ajahmjj.exe -mngyzad
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\ajahmjj.exe

    Filesize

    150KB

    MD5

    79853e2bdbaa8bb1ccb89510f09af7f9

    SHA1

    57ad43357462e6cc7997045aa67232172a0ba97b

    SHA256

    fa4973e5071266cea5d2c63d522731de2414c5481322f3236bcd821fa106f968

    SHA512

    3f3fa8cbdd766df93d0625735cbfd411a6b5e31dfdef0604c530ee2558af3991fbc0a3e68d3ff855c07c1d3ff7f9d253bcec48e59f5242669007dd3c26cc660d

  • C:\PROGRA~3\Mozilla\ajahmjj.exe

    Filesize

    150KB

    MD5

    79853e2bdbaa8bb1ccb89510f09af7f9

    SHA1

    57ad43357462e6cc7997045aa67232172a0ba97b

    SHA256

    fa4973e5071266cea5d2c63d522731de2414c5481322f3236bcd821fa106f968

    SHA512

    3f3fa8cbdd766df93d0625735cbfd411a6b5e31dfdef0604c530ee2558af3991fbc0a3e68d3ff855c07c1d3ff7f9d253bcec48e59f5242669007dd3c26cc660d

  • memory/844-10-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/844-11-0x0000000000430000-0x000000000048B000-memory.dmp

    Filesize

    364KB

  • memory/1968-0-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1968-1-0x00000000002E0000-0x000000000033B000-memory.dmp

    Filesize

    364KB

  • memory/1968-7-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB