Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
05-11-2023 16:03
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.5d02fa5b7537f340b1a8eaff368476d0_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.5d02fa5b7537f340b1a8eaff368476d0_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.5d02fa5b7537f340b1a8eaff368476d0_JC.exe
-
Size
128KB
-
MD5
5d02fa5b7537f340b1a8eaff368476d0
-
SHA1
a88bb341d65e4f28b99e78145439e8c77d14e8a7
-
SHA256
4a1aa0017edb8629ae7cbea9564ee6490ef4de529023a494f1f70baebf829059
-
SHA512
08e74db183a5dfc8642042c7bd5830062b7975b61a56bac91b10ad650d842e5dc86171c5b2466a5779dbb3c93bba68d27382ac488fe6745a907027d9259d04eb
-
SSDEEP
3072:Te41eh3m0CYa8iZjsm6HB3p36o2fR39j+85N2dS:6Ph3wYpiZjn6HbZ2Z39j5GS
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2744 zimfrwc.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\zimfrwc.exe NEAS.5d02fa5b7537f340b1a8eaff368476d0_JC.exe File created C:\PROGRA~3\Mozilla\pjqvbbf.dll zimfrwc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2744 2232 taskeng.exe 29 PID 2232 wrote to memory of 2744 2232 taskeng.exe 29 PID 2232 wrote to memory of 2744 2232 taskeng.exe 29 PID 2232 wrote to memory of 2744 2232 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5d02fa5b7537f340b1a8eaff368476d0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5d02fa5b7537f340b1a8eaff368476d0_JC.exe"1⤵
- Drops file in Program Files directory
PID:1740
-
C:\Windows\system32\taskeng.exetaskeng.exe {166940A0-5921-4F42-B13F-3D002EAA53C6} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\PROGRA~3\Mozilla\zimfrwc.exeC:\PROGRA~3\Mozilla\zimfrwc.exe -gtjzibe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5ec1ec1a7bde2c5cd7da4d18bd0e8023b
SHA14b5aa518bb64125fe703eac82d1ca9ed4f7a4415
SHA25678905800440c03268ceb1bd530074e15bb8064d40b52fdf80f65167c9461d636
SHA5128f1bd06515af69b69e9f59f83715a32d5f4b9a7de2ae3622e3c83e3f8c9f01c07ebe1a4d9eb7fac862a5e13f2cf2835bf455f2d92c48150f1db8a9af900f68eb
-
Filesize
128KB
MD5ec1ec1a7bde2c5cd7da4d18bd0e8023b
SHA14b5aa518bb64125fe703eac82d1ca9ed4f7a4415
SHA25678905800440c03268ceb1bd530074e15bb8064d40b52fdf80f65167c9461d636
SHA5128f1bd06515af69b69e9f59f83715a32d5f4b9a7de2ae3622e3c83e3f8c9f01c07ebe1a4d9eb7fac862a5e13f2cf2835bf455f2d92c48150f1db8a9af900f68eb