Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
16/11/2023, 08:14
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2403818fc0fcfbfe3e58e729eacdfd50.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.2403818fc0fcfbfe3e58e729eacdfd50.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2403818fc0fcfbfe3e58e729eacdfd50.exe
-
Size
700KB
-
MD5
2403818fc0fcfbfe3e58e729eacdfd50
-
SHA1
66380c1b5dc72b4f7de17e26b6e4f6caf99a56cf
-
SHA256
e0d3f82b88ac429f7d88c2ec3afc3a45a43986daeb60dfb8ed718ba14f5182dd
-
SHA512
35a3c306bf0bf42c4e8f2e28ddc16ec3f1e1126a06a225c39a6041dcce254aca27e570567f3fa53febebfa12602138d1c59f6504e6c2ea2a4aaa1604de0aa19b
-
SSDEEP
12288:BOVo4A1fgyv8godP1PwPvw2M5ONeJuMqzBDJkk2ERvT8MPAf/O6s:BOVkN2tonZ79MqFDJkxqo4Af/3s
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1852 _7z.exe -
Loads dropped DLL 2 IoCs
pid Process 2144 NEAS.2403818fc0fcfbfe3e58e729eacdfd50.exe 2144 NEAS.2403818fc0fcfbfe3e58e729eacdfd50.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe NEAS.2403818fc0fcfbfe3e58e729eacdfd50.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe NEAS.2403818fc0fcfbfe3e58e729eacdfd50.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2144 wrote to memory of 1852 2144 NEAS.2403818fc0fcfbfe3e58e729eacdfd50.exe 29 PID 2144 wrote to memory of 1852 2144 NEAS.2403818fc0fcfbfe3e58e729eacdfd50.exe 29 PID 2144 wrote to memory of 1852 2144 NEAS.2403818fc0fcfbfe3e58e729eacdfd50.exe 29 PID 2144 wrote to memory of 1852 2144 NEAS.2403818fc0fcfbfe3e58e729eacdfd50.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2403818fc0fcfbfe3e58e729eacdfd50.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2403818fc0fcfbfe3e58e729eacdfd50.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵PID:2296
-
-
C:\Users\Admin\AppData\Local\Temp\_7z.exe"_7z.exe"2⤵
- Executes dropped EXE
PID:1852
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
324KB
MD57187ae605f4dce14bb23ea2623956335
SHA1f7c1df33b875c98f41dcde24117d89d42d25b7ce
SHA2569e2631c19b243c28b0980607ced2540e9447b1166572483475547c1a9dd4ac0e
SHA512f64522e2fb6bb61884fe53c34e79b355efb9ec33c02b2cd67d729af7d763e7b3873a5c7ce6ac7bb4567e6bcf8c70cadbc66f511e8bb151ab05096a832032bc8f
-
Filesize
324KB
MD57187ae605f4dce14bb23ea2623956335
SHA1f7c1df33b875c98f41dcde24117d89d42d25b7ce
SHA2569e2631c19b243c28b0980607ced2540e9447b1166572483475547c1a9dd4ac0e
SHA512f64522e2fb6bb61884fe53c34e79b355efb9ec33c02b2cd67d729af7d763e7b3873a5c7ce6ac7bb4567e6bcf8c70cadbc66f511e8bb151ab05096a832032bc8f
-
Filesize
376KB
MD51729dad8bdc82256422546bab492002d
SHA1903eac92d121514ce0d1c078dc79962325b8c0b6
SHA256c7a42850c14be02bb924bc8315de7d17023c18410feb23dff733494785d9e5eb
SHA512d4a968fbd6d43aa7dfab7751aa479fbf0a6fd13c910cc4f0c0bbfc409ff952ac0556d221deec3d000a5475cf34e560e8a36dece99cf7d4a1a0c583f0b7d34453