Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
15-11-2023 07:24
Behavioral task
behavioral1
Sample
NEAS.de2e996c21aeb7b1e81d1fdf591356b0.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.de2e996c21aeb7b1e81d1fdf591356b0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.de2e996c21aeb7b1e81d1fdf591356b0.exe
-
Size
365KB
-
MD5
de2e996c21aeb7b1e81d1fdf591356b0
-
SHA1
2ec042dd06ce04693808bfc859946094d40d337d
-
SHA256
1417dda275c79d90d1485bf2580a4b13838a72efcaca3941f3a172f588c4f0e8
-
SHA512
d6ff93f5d794175d2b34af63ff2770190007f3674939b304a4fc7bdf287303f0c2d3a9494488f2c907cdd6907e31a761b40ec3b62832c2296620dd50a7d13880
-
SSDEEP
3072:z4w8gTsDAJJRjOuChIRZOzSot3LFZhh2D+0caj3kyRACEM//+9:z4w9JJDIzRn9ozEE+9
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2656 kymnayk.exe -
resource yara_rule behavioral1/memory/2428-0-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/files/0x000a000000012024-6.dat upx behavioral1/files/0x000a000000012024-7.dat upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\iuxrktg.dll kymnayk.exe File created C:\PROGRA~3\Mozilla\kymnayk.exe NEAS.de2e996c21aeb7b1e81d1fdf591356b0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2428 NEAS.de2e996c21aeb7b1e81d1fdf591356b0.exe 2656 kymnayk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2656 1744 taskeng.exe 29 PID 1744 wrote to memory of 2656 1744 taskeng.exe 29 PID 1744 wrote to memory of 2656 1744 taskeng.exe 29 PID 1744 wrote to memory of 2656 1744 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.de2e996c21aeb7b1e81d1fdf591356b0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.de2e996c21aeb7b1e81d1fdf591356b0.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2428
-
C:\Windows\system32\taskeng.exetaskeng.exe {D66BD21A-D7B8-4B4B-8234-E871C1AA9EE7} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\PROGRA~3\Mozilla\kymnayk.exeC:\PROGRA~3\Mozilla\kymnayk.exe -dtmxjcd2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
365KB
MD552b1382536e463c92b28c607bc37d1f2
SHA1684a31dfd490d0f84d70a2f16a3c4345cbd80d88
SHA256af95ebd1a2c301233419e3a77e4a5ac23ecf81b6cdc6c732d91972066ef7bca9
SHA512a43d52cf3f1b837067916406257e9d7fad4eed72aec0a0e6dadf8b79e00df08dd312978e820bc59496e8757ca2e101b49e5d01e01d2e580be77d81e04694ce53
-
Filesize
365KB
MD552b1382536e463c92b28c607bc37d1f2
SHA1684a31dfd490d0f84d70a2f16a3c4345cbd80d88
SHA256af95ebd1a2c301233419e3a77e4a5ac23ecf81b6cdc6c732d91972066ef7bca9
SHA512a43d52cf3f1b837067916406257e9d7fad4eed72aec0a0e6dadf8b79e00df08dd312978e820bc59496e8757ca2e101b49e5d01e01d2e580be77d81e04694ce53