Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
05-11-2023 09:49
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.5cf4dac4209192852f3926a8ff75b670_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.5cf4dac4209192852f3926a8ff75b670_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.5cf4dac4209192852f3926a8ff75b670_JC.exe
-
Size
195KB
-
MD5
5cf4dac4209192852f3926a8ff75b670
-
SHA1
d80565281a7afe8bc24a8aef60e66d9c9cff4a3d
-
SHA256
5b96a419427d262c6975fa05a509afb3d6de97f6d4afe0d36a379c1585fe1c69
-
SHA512
86d9f5476b179cbf9666ffefb859f71dfb2fe7f041d5cb9c4b58e63f711479d94ccee26d81beea63599ad3eef71c4f0ad161c9fd5934820f3d8ac40f4a697921
-
SSDEEP
3072:R2n7CoWd07esc3BUEgiahMdnZylqQFB07dnajNo4atrcvpoNpVC6BYz0:aCoWd0kSEgiiAZc1B07ZaJo6iNq6BYQ
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 3008 suvkbwn.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\suvkbwn.exe NEAS.5cf4dac4209192852f3926a8ff75b670_JC.exe File created C:\PROGRA~3\Mozilla\wfwcssm.dll suvkbwn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 3008 2224 taskeng.exe 29 PID 2224 wrote to memory of 3008 2224 taskeng.exe 29 PID 2224 wrote to memory of 3008 2224 taskeng.exe 29 PID 2224 wrote to memory of 3008 2224 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5cf4dac4209192852f3926a8ff75b670_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5cf4dac4209192852f3926a8ff75b670_JC.exe"1⤵
- Drops file in Program Files directory
PID:2964
-
C:\Windows\system32\taskeng.exetaskeng.exe {F18B92B6-C6EB-44B9-88DE-4C99E147CF7F} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\PROGRA~3\Mozilla\suvkbwn.exeC:\PROGRA~3\Mozilla\suvkbwn.exe -tlhykym2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195KB
MD5b250abb2f09faef340022a12a989b2be
SHA1f5a0ad79b6c78d54b89f96451ffbd2aa83298a05
SHA25662a4980978b4e9df33da409ecf6d14bfa1247f06a8aac34100fa157071285c9d
SHA5120f94f3cfd7ed2ff53a44cce51fa27a39ce162f43df2ceeb24dfa2a80d3cd6f258758d987fc485d760bb35ea39ca72fd65c1916f197f7d2c1c3b3f216f152ac03
-
Filesize
195KB
MD5b250abb2f09faef340022a12a989b2be
SHA1f5a0ad79b6c78d54b89f96451ffbd2aa83298a05
SHA25662a4980978b4e9df33da409ecf6d14bfa1247f06a8aac34100fa157071285c9d
SHA5120f94f3cfd7ed2ff53a44cce51fa27a39ce162f43df2ceeb24dfa2a80d3cd6f258758d987fc485d760bb35ea39ca72fd65c1916f197f7d2c1c3b3f216f152ac03