Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
06-10-2023 15:52
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.65ca061c3cb6a7aabf0c09b289ace010_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.65ca061c3cb6a7aabf0c09b289ace010_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.65ca061c3cb6a7aabf0c09b289ace010_JC.exe
-
Size
42KB
-
MD5
65ca061c3cb6a7aabf0c09b289ace010
-
SHA1
f3608940b2ce3b34eef1b85e9f6c7e7fd0f57556
-
SHA256
dbe3570162d029a48024d276e0169c995868e6f3cf710cc8f063146008da46b3
-
SHA512
3e7c8985493ec50a66c18bb6e18d9182df0a13682a30deed5898eaa76ca24b8daf1250a658d0bf6f75e91bebcc4859cbcbc82b9fc74acfc68a6d6a8d113bb13b
-
SSDEEP
768:0ex2ZFuS3P4OjHXRrs9sINeZEtejlIkoLN127BFVn2p4lAnZ8Oog+favSxf7x8qQ:0eqPjXRrs9sINeZEtejlIkoLN127BFVE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3036 google_updater.exe -
Loads dropped DLL 1 IoCs
pid Process 2124 NEAS.65ca061c3cb6a7aabf0c09b289ace010_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2124 wrote to memory of 3036 2124 NEAS.65ca061c3cb6a7aabf0c09b289ace010_JC.exe 28 PID 2124 wrote to memory of 3036 2124 NEAS.65ca061c3cb6a7aabf0c09b289ace010_JC.exe 28 PID 2124 wrote to memory of 3036 2124 NEAS.65ca061c3cb6a7aabf0c09b289ace010_JC.exe 28 PID 2124 wrote to memory of 3036 2124 NEAS.65ca061c3cb6a7aabf0c09b289ace010_JC.exe 28 PID 2124 wrote to memory of 3036 2124 NEAS.65ca061c3cb6a7aabf0c09b289ace010_JC.exe 28 PID 2124 wrote to memory of 3036 2124 NEAS.65ca061c3cb6a7aabf0c09b289ace010_JC.exe 28 PID 2124 wrote to memory of 3036 2124 NEAS.65ca061c3cb6a7aabf0c09b289ace010_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.65ca061c3cb6a7aabf0c09b289ace010_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.65ca061c3cb6a7aabf0c09b289ace010_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\google_updater.exe"C:\Users\Admin\AppData\Local\Temp\google_updater.exe"2⤵
- Executes dropped EXE
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5e866dfc827f9abbf37cd48fa84a1012f
SHA1985e0ad7271b504af669a8e255b8a36e6a6aeea2
SHA256c46aa925b8cbae80d3ac6f13d7bf7ceaae52971d74c22ce9c1a86bd7cf86dd21
SHA5122291b7e439c15fda302742e486f843ead4ecd363273d059f3c672748c6ea7935a011540a44ee1c4470f043b5576ce2a8f09d95e19d42799afd48e6da0a08fe05
-
Filesize
42KB
MD5e866dfc827f9abbf37cd48fa84a1012f
SHA1985e0ad7271b504af669a8e255b8a36e6a6aeea2
SHA256c46aa925b8cbae80d3ac6f13d7bf7ceaae52971d74c22ce9c1a86bd7cf86dd21
SHA5122291b7e439c15fda302742e486f843ead4ecd363273d059f3c672748c6ea7935a011540a44ee1c4470f043b5576ce2a8f09d95e19d42799afd48e6da0a08fe05
-
Filesize
42KB
MD5e866dfc827f9abbf37cd48fa84a1012f
SHA1985e0ad7271b504af669a8e255b8a36e6a6aeea2
SHA256c46aa925b8cbae80d3ac6f13d7bf7ceaae52971d74c22ce9c1a86bd7cf86dd21
SHA5122291b7e439c15fda302742e486f843ead4ecd363273d059f3c672748c6ea7935a011540a44ee1c4470f043b5576ce2a8f09d95e19d42799afd48e6da0a08fe05