Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2023 20:40

General

  • Target

    NEAS.6bb81a63467e08f3252a5740e3e200b0.exe

  • Size

    216KB

  • MD5

    6bb81a63467e08f3252a5740e3e200b0

  • SHA1

    d7370039e6aa0d9d622e97a762b0ab7785d9a689

  • SHA256

    c3064a1cf0a9bea8f41fc842d172dceff05c8e3a02d47d48437d090c36b7b4d9

  • SHA512

    70260ec28059c335435b5842ba5c73a8ac8150cdf4cecbc3f296992a5492fa7bb759e6fe1b8583e4c04db67c8e8fb4b7977f765f3f4d7ce3e51f5da94320bf14

  • SSDEEP

    6144:HdUQ0N9Tx9l3Eg+b/IEjXMu55of50o773GhDvP:96Trl0g+bIEpXov3GNH

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.6bb81a63467e08f3252a5740e3e200b0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.6bb81a63467e08f3252a5740e3e200b0.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of UnmapMainImage
    PID:2040
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {95790168-144C-49D7-9EEE-7EA9E2BBA027} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\PROGRA~3\Mozilla\suvkbwn.exe
      C:\PROGRA~3\Mozilla\suvkbwn.exe -tlhykym
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of UnmapMainImage
      PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\suvkbwn.exe

    Filesize

    216KB

    MD5

    791c7ccf3d3c27eb94121c7084e0e685

    SHA1

    f4f454bb9a2b264941b0c9cbee5d2cc55532e7ba

    SHA256

    26d82f05dcb1ee98cff051892fd3ff9a370e6f9b6c722f4205b6fc770103b385

    SHA512

    2a0fbec9fbc15753bb1c93a8ab712aa6146931ff20ccfc65ea0234d74d8a4743216236ca92d362bbf3647bd9cedf5c5b44110a49c2c1d42198a2f32e4ff3c627

  • C:\PROGRA~3\Mozilla\suvkbwn.exe

    Filesize

    216KB

    MD5

    791c7ccf3d3c27eb94121c7084e0e685

    SHA1

    f4f454bb9a2b264941b0c9cbee5d2cc55532e7ba

    SHA256

    26d82f05dcb1ee98cff051892fd3ff9a370e6f9b6c722f4205b6fc770103b385

    SHA512

    2a0fbec9fbc15753bb1c93a8ab712aa6146931ff20ccfc65ea0234d74d8a4743216236ca92d362bbf3647bd9cedf5c5b44110a49c2c1d42198a2f32e4ff3c627

  • memory/2040-2-0x0000000000250000-0x00000000002AB000-memory.dmp

    Filesize

    364KB

  • memory/2040-1-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2040-0-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2040-4-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2684-7-0x0000000000460000-0x00000000004BB000-memory.dmp

    Filesize

    364KB

  • memory/2684-8-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2684-10-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2684-11-0x0000000000460000-0x00000000004BB000-memory.dmp

    Filesize

    364KB