Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
16-11-2023 10:24
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.ff3378708a010d6e6c635e2348dc9d20.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.ff3378708a010d6e6c635e2348dc9d20.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.ff3378708a010d6e6c635e2348dc9d20.exe
-
Size
231KB
-
MD5
ff3378708a010d6e6c635e2348dc9d20
-
SHA1
9ab038c8247d2a80471447b97fce853206b40c52
-
SHA256
081f0222dd521deca66d5d8398aa17101349f4af91a38f2cd4217f8cf87dfb6a
-
SHA512
2ffdbafb5e1983f52d650be7f8d95432c4d8b642b8ad3a781e928b3f1745116aaeb3029cef0381d0eaeedde33680f86b6277ffffac9a4b616f17fa81098e4ba0
-
SSDEEP
6144:heBcsrOU6kL38n3mYZOONgMmTyuxCBcTVZ:h1UnL3ymDxeSTVZ
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2640 zimfrwc.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\zimfrwc.exe NEAS.ff3378708a010d6e6c635e2348dc9d20.exe File created C:\PROGRA~3\Mozilla\pjqvbbf.dll zimfrwc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2468 NEAS.ff3378708a010d6e6c635e2348dc9d20.exe 2640 zimfrwc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2640 2360 taskeng.exe 29 PID 2360 wrote to memory of 2640 2360 taskeng.exe 29 PID 2360 wrote to memory of 2640 2360 taskeng.exe 29 PID 2360 wrote to memory of 2640 2360 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.ff3378708a010d6e6c635e2348dc9d20.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.ff3378708a010d6e6c635e2348dc9d20.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2468
-
C:\Windows\system32\taskeng.exetaskeng.exe {4045065F-AE73-49AC-886C-E44F51DA2606} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\PROGRA~3\Mozilla\zimfrwc.exeC:\PROGRA~3\Mozilla\zimfrwc.exe -gtjzibe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5f41d4c6a92b891dd7b89f14fcda91b45
SHA1a6751256abae0f28355c47ea837008d29fa5fe13
SHA25648d2428cbe28e0ec54dbe7f31be878010a6a992c646242eaa20300733f386de9
SHA512a4d99c87487d7b5d1c145ccd94cb4050e4c216a6c4203d2e54937c17d67581aaa2695c42a9a1cbe2adda6e71d56349a949ab5aaf694a8341ce16c8b109689a4d
-
Filesize
231KB
MD5f41d4c6a92b891dd7b89f14fcda91b45
SHA1a6751256abae0f28355c47ea837008d29fa5fe13
SHA25648d2428cbe28e0ec54dbe7f31be878010a6a992c646242eaa20300733f386de9
SHA512a4d99c87487d7b5d1c145ccd94cb4050e4c216a6c4203d2e54937c17d67581aaa2695c42a9a1cbe2adda6e71d56349a949ab5aaf694a8341ce16c8b109689a4d