Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
15-11-2023 04:50
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.eb62b5fdd24240ba4548dbdd4e746e40.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.eb62b5fdd24240ba4548dbdd4e746e40.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.eb62b5fdd24240ba4548dbdd4e746e40.exe
-
Size
159KB
-
MD5
eb62b5fdd24240ba4548dbdd4e746e40
-
SHA1
99714d2feef6803f4c6c30518750ab60d83c9b6e
-
SHA256
ae2b4df06801fe907bcacc5c37ac3b9be2d3fd92c803da110dc4bfff59517457
-
SHA512
8f54f6953eccfd868c45606a213d4a84561e9bcf6710c2551db283b9c3d8e928e2a6d931b49ca4d98c0cdff56741280312c4ad5a1f2321ba09578256d761d245
-
SSDEEP
3072:Qr6wY2Igs7T2G7Sj8GomX5VltS2gS1l8BhhGxbek1hAnwbGEUPIWmHbNh4qeAP:QraM8GomJVl82gglkGxb1taPIrHJh4qb
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2824 ajahmjj.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\ajahmjj.exe NEAS.eb62b5fdd24240ba4548dbdd4e746e40.exe File created C:\PROGRA~3\Mozilla\ghzyxbm.dll ajahmjj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2824 2152 taskeng.exe 29 PID 2152 wrote to memory of 2824 2152 taskeng.exe 29 PID 2152 wrote to memory of 2824 2152 taskeng.exe 29 PID 2152 wrote to memory of 2824 2152 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.eb62b5fdd24240ba4548dbdd4e746e40.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.eb62b5fdd24240ba4548dbdd4e746e40.exe"1⤵
- Drops file in Program Files directory
PID:1928
-
C:\Windows\system32\taskeng.exetaskeng.exe {CD673805-8803-439F-AF9F-2DE11F0D2039} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\PROGRA~3\Mozilla\ajahmjj.exeC:\PROGRA~3\Mozilla\ajahmjj.exe -mngyzad2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159KB
MD5c9dadbf4a930ec967e96403ad74c157f
SHA1d4f65c4fb038e1c9aa05dee3c374ef4a507ff44a
SHA256eeb0150c8131ce9f7bd96b1847684898904bd5390604eaf316ce4415d76cb916
SHA5122eef70de56c2f784846c12b52de7cb57fba0127d7674d67acf1e20c3d0bb5d83315f43c5e1f8ffbb7258beb6f2eb938068f9862f68f0e0747a20c1dca87d053a
-
Filesize
159KB
MD5c9dadbf4a930ec967e96403ad74c157f
SHA1d4f65c4fb038e1c9aa05dee3c374ef4a507ff44a
SHA256eeb0150c8131ce9f7bd96b1847684898904bd5390604eaf316ce4415d76cb916
SHA5122eef70de56c2f784846c12b52de7cb57fba0127d7674d67acf1e20c3d0bb5d83315f43c5e1f8ffbb7258beb6f2eb938068f9862f68f0e0747a20c1dca87d053a