Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-11-2023 04:50

General

  • Target

    NEAS.eb62b5fdd24240ba4548dbdd4e746e40.exe

  • Size

    159KB

  • MD5

    eb62b5fdd24240ba4548dbdd4e746e40

  • SHA1

    99714d2feef6803f4c6c30518750ab60d83c9b6e

  • SHA256

    ae2b4df06801fe907bcacc5c37ac3b9be2d3fd92c803da110dc4bfff59517457

  • SHA512

    8f54f6953eccfd868c45606a213d4a84561e9bcf6710c2551db283b9c3d8e928e2a6d931b49ca4d98c0cdff56741280312c4ad5a1f2321ba09578256d761d245

  • SSDEEP

    3072:Qr6wY2Igs7T2G7Sj8GomX5VltS2gS1l8BhhGxbek1hAnwbGEUPIWmHbNh4qeAP:QraM8GomJVl82gglkGxb1taPIrHJh4qb

Score
8/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.eb62b5fdd24240ba4548dbdd4e746e40.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.eb62b5fdd24240ba4548dbdd4e746e40.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3856
  • C:\PROGRA~3\Mozilla\ghezyal.exe
    C:\PROGRA~3\Mozilla\ghezyal.exe -cypomaj
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:3100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\ghezyal.exe

    Filesize

    159KB

    MD5

    0c1087a4d8e94814b6889a2a8e13bd46

    SHA1

    3cb0a7b25ae09c3f0daf440710898356d81b9f4f

    SHA256

    f1a8a9c91b226ed743d3f24d9033f8cb4b5e4dd732e25f5f933cb408ae99c2c3

    SHA512

    9960a42094b2688b2c91d1200d0661b5811faa494880bf7f3cac4c97aab78703a65df6b265b02dd9b3cc41d32869c19604586e5ef55b4ef6d3b97261242ae197

  • C:\ProgramData\Mozilla\ghezyal.exe

    Filesize

    159KB

    MD5

    0c1087a4d8e94814b6889a2a8e13bd46

    SHA1

    3cb0a7b25ae09c3f0daf440710898356d81b9f4f

    SHA256

    f1a8a9c91b226ed743d3f24d9033f8cb4b5e4dd732e25f5f933cb408ae99c2c3

    SHA512

    9960a42094b2688b2c91d1200d0661b5811faa494880bf7f3cac4c97aab78703a65df6b265b02dd9b3cc41d32869c19604586e5ef55b4ef6d3b97261242ae197

  • memory/3100-11-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3100-12-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3100-13-0x0000000000D70000-0x0000000000DCB000-memory.dmp

    Filesize

    364KB

  • memory/3100-19-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3856-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3856-1-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3856-2-0x0000000002170000-0x00000000021CB000-memory.dmp

    Filesize

    364KB

  • memory/3856-10-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB