Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
12/11/2023, 21:46
Behavioral task
behavioral1
Sample
NEAS.c0c84aa1c63530b003f3296cb2db24e0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.c0c84aa1c63530b003f3296cb2db24e0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.c0c84aa1c63530b003f3296cb2db24e0.exe
-
Size
369KB
-
MD5
c0c84aa1c63530b003f3296cb2db24e0
-
SHA1
36495c075d72102545a145f29148a5dd8e68e940
-
SHA256
03c635ad46a95d035f72db802b8393525fcfd89a692276d22184dbdc32919288
-
SHA512
7c2c3125a9ca7b42bab4c0389c788b4fc9ab1350c2aa5da96a93721ff77ff3071e1ef97b6aac0602a9d67b5702824b6300bef4f29497b54efc335822d02d6502
-
SSDEEP
6144:UHEagZcctnCqhPHbMMCji9B0AwV1OkF7YH62LIHO8OIANZwtvTvF9fjd:UHEagZccMIPHwxi9RwyxH61O8OIs0Z
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2624 wwljcul.exe -
resource yara_rule behavioral1/memory/2576-0-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/files/0x0035000000016fda-5.dat upx behavioral1/memory/2624-7-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/files/0x0035000000016fda-6.dat upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\wwljcul.exe NEAS.c0c84aa1c63530b003f3296cb2db24e0.exe File created C:\PROGRA~3\Mozilla\sdwojsn.dll wwljcul.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2576 NEAS.c0c84aa1c63530b003f3296cb2db24e0.exe 2624 wwljcul.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2624 2284 taskeng.exe 29 PID 2284 wrote to memory of 2624 2284 taskeng.exe 29 PID 2284 wrote to memory of 2624 2284 taskeng.exe 29 PID 2284 wrote to memory of 2624 2284 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.c0c84aa1c63530b003f3296cb2db24e0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.c0c84aa1c63530b003f3296cb2db24e0.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2576
-
C:\Windows\system32\taskeng.exetaskeng.exe {9CC4B53F-E515-4032-A848-BDF1F86B7619} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\PROGRA~3\Mozilla\wwljcul.exeC:\PROGRA~3\Mozilla\wwljcul.exe -anxczaj2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
369KB
MD58e75cd170285feec939e1f4775c22e72
SHA1aec8110215937261a53f05b675c235b22aa28625
SHA256de081f344ed3020f751b861ead0443e08c9620127b3ac326978f3b4c4f647064
SHA5123c37146e22c1e1f81a9bd712c6b4a05a68662f19aa7d226fea13346ab8ecde9c9a936506c36911a42aeeb9abf91631228dd2ea294689a5cb52996bf43f0428d1
-
Filesize
369KB
MD58e75cd170285feec939e1f4775c22e72
SHA1aec8110215937261a53f05b675c235b22aa28625
SHA256de081f344ed3020f751b861ead0443e08c9620127b3ac326978f3b4c4f647064
SHA5123c37146e22c1e1f81a9bd712c6b4a05a68662f19aa7d226fea13346ab8ecde9c9a936506c36911a42aeeb9abf91631228dd2ea294689a5cb52996bf43f0428d1