Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    15-11-2023 07:24

General

  • Target

    NEAS.de2e996c21aeb7b1e81d1fdf591356b0.exe

  • Size

    365KB

  • MD5

    de2e996c21aeb7b1e81d1fdf591356b0

  • SHA1

    2ec042dd06ce04693808bfc859946094d40d337d

  • SHA256

    1417dda275c79d90d1485bf2580a4b13838a72efcaca3941f3a172f588c4f0e8

  • SHA512

    d6ff93f5d794175d2b34af63ff2770190007f3674939b304a4fc7bdf287303f0c2d3a9494488f2c907cdd6907e31a761b40ec3b62832c2296620dd50a7d13880

  • SSDEEP

    3072:z4w8gTsDAJJRjOuChIRZOzSot3LFZhh2D+0caj3kyRACEM//+9:z4w9JJDIzRn9ozEE+9

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.de2e996c21aeb7b1e81d1fdf591356b0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.de2e996c21aeb7b1e81d1fdf591356b0.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of UnmapMainImage
    PID:2428
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {D66BD21A-D7B8-4B4B-8234-E871C1AA9EE7} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\PROGRA~3\Mozilla\kymnayk.exe
      C:\PROGRA~3\Mozilla\kymnayk.exe -dtmxjcd
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of UnmapMainImage
      PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\kymnayk.exe

    Filesize

    365KB

    MD5

    52b1382536e463c92b28c607bc37d1f2

    SHA1

    684a31dfd490d0f84d70a2f16a3c4345cbd80d88

    SHA256

    af95ebd1a2c301233419e3a77e4a5ac23ecf81b6cdc6c732d91972066ef7bca9

    SHA512

    a43d52cf3f1b837067916406257e9d7fad4eed72aec0a0e6dadf8b79e00df08dd312978e820bc59496e8757ca2e101b49e5d01e01d2e580be77d81e04694ce53

  • C:\PROGRA~3\Mozilla\kymnayk.exe

    Filesize

    365KB

    MD5

    52b1382536e463c92b28c607bc37d1f2

    SHA1

    684a31dfd490d0f84d70a2f16a3c4345cbd80d88

    SHA256

    af95ebd1a2c301233419e3a77e4a5ac23ecf81b6cdc6c732d91972066ef7bca9

    SHA512

    a43d52cf3f1b837067916406257e9d7fad4eed72aec0a0e6dadf8b79e00df08dd312978e820bc59496e8757ca2e101b49e5d01e01d2e580be77d81e04694ce53

  • memory/2428-0-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2428-1-0x0000000000340000-0x000000000039B000-memory.dmp

    Filesize

    364KB

  • memory/2428-2-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2428-4-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2428-5-0x0000000000340000-0x000000000039B000-memory.dmp

    Filesize

    364KB

  • memory/2656-8-0x00000000003A0000-0x00000000003FB000-memory.dmp

    Filesize

    364KB

  • memory/2656-9-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2656-11-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2656-12-0x00000000003A0000-0x00000000003FB000-memory.dmp

    Filesize

    364KB