Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    15-11-2023 04:50

General

  • Target

    NEAS.eb62b5fdd24240ba4548dbdd4e746e40.exe

  • Size

    159KB

  • MD5

    eb62b5fdd24240ba4548dbdd4e746e40

  • SHA1

    99714d2feef6803f4c6c30518750ab60d83c9b6e

  • SHA256

    ae2b4df06801fe907bcacc5c37ac3b9be2d3fd92c803da110dc4bfff59517457

  • SHA512

    8f54f6953eccfd868c45606a213d4a84561e9bcf6710c2551db283b9c3d8e928e2a6d931b49ca4d98c0cdff56741280312c4ad5a1f2321ba09578256d761d245

  • SSDEEP

    3072:Qr6wY2Igs7T2G7Sj8GomX5VltS2gS1l8BhhGxbek1hAnwbGEUPIWmHbNh4qeAP:QraM8GomJVl82gglkGxb1taPIrHJh4qb

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.eb62b5fdd24240ba4548dbdd4e746e40.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.eb62b5fdd24240ba4548dbdd4e746e40.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1928
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {CD673805-8803-439F-AF9F-2DE11F0D2039} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\PROGRA~3\Mozilla\ajahmjj.exe
      C:\PROGRA~3\Mozilla\ajahmjj.exe -mngyzad
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\ajahmjj.exe

    Filesize

    159KB

    MD5

    c9dadbf4a930ec967e96403ad74c157f

    SHA1

    d4f65c4fb038e1c9aa05dee3c374ef4a507ff44a

    SHA256

    eeb0150c8131ce9f7bd96b1847684898904bd5390604eaf316ce4415d76cb916

    SHA512

    2eef70de56c2f784846c12b52de7cb57fba0127d7674d67acf1e20c3d0bb5d83315f43c5e1f8ffbb7258beb6f2eb938068f9862f68f0e0747a20c1dca87d053a

  • C:\PROGRA~3\Mozilla\ajahmjj.exe

    Filesize

    159KB

    MD5

    c9dadbf4a930ec967e96403ad74c157f

    SHA1

    d4f65c4fb038e1c9aa05dee3c374ef4a507ff44a

    SHA256

    eeb0150c8131ce9f7bd96b1847684898904bd5390604eaf316ce4415d76cb916

    SHA512

    2eef70de56c2f784846c12b52de7cb57fba0127d7674d67acf1e20c3d0bb5d83315f43c5e1f8ffbb7258beb6f2eb938068f9862f68f0e0747a20c1dca87d053a

  • memory/1928-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1928-1-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1928-2-0x0000000001BA0000-0x0000000001BFB000-memory.dmp

    Filesize

    364KB

  • memory/1928-8-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2824-11-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2824-12-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2824-13-0x00000000001B0000-0x000000000020B000-memory.dmp

    Filesize

    364KB

  • memory/2824-19-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB