Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
07/10/2023, 11:18
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.b3847e84d2f92ea513b57aeb7fdb3f66_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.b3847e84d2f92ea513b57aeb7fdb3f66_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.b3847e84d2f92ea513b57aeb7fdb3f66_JC.exe
-
Size
384KB
-
MD5
b3847e84d2f92ea513b57aeb7fdb3f66
-
SHA1
ae97e1d3c3516a46d024b020c85284ccec40de05
-
SHA256
bdb342a73ba4e6933ba8430520390027f0f02b12e677364e85a4f78176a3b480
-
SHA512
6a0d311b23c0140e93745b65a38104c8ea3f324b9b01db121ef3db3cbf2431772d83bf65d8a3c69ca519f1b024773b907cd653e4ba9c293a0d1745ab2e5a7f2e
-
SSDEEP
6144:iCGJC7dIt/aY5qiP9aFCwESXkEjiPISUOgW9X+hOGzC/NM:iBJyut/kiP9awpWkmZzcukG2/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2756 WVBJ.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\windows\WVBJ.exe NEAS.b3847e84d2f92ea513b57aeb7fdb3f66_JC.exe File opened for modification C:\windows\WVBJ.exe NEAS.b3847e84d2f92ea513b57aeb7fdb3f66_JC.exe File created C:\windows\WVBJ.exe.bat NEAS.b3847e84d2f92ea513b57aeb7fdb3f66_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2288 NEAS.b3847e84d2f92ea513b57aeb7fdb3f66_JC.exe 2756 WVBJ.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2288 NEAS.b3847e84d2f92ea513b57aeb7fdb3f66_JC.exe 2288 NEAS.b3847e84d2f92ea513b57aeb7fdb3f66_JC.exe 2756 WVBJ.exe 2756 WVBJ.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2636 2288 NEAS.b3847e84d2f92ea513b57aeb7fdb3f66_JC.exe 28 PID 2288 wrote to memory of 2636 2288 NEAS.b3847e84d2f92ea513b57aeb7fdb3f66_JC.exe 28 PID 2288 wrote to memory of 2636 2288 NEAS.b3847e84d2f92ea513b57aeb7fdb3f66_JC.exe 28 PID 2288 wrote to memory of 2636 2288 NEAS.b3847e84d2f92ea513b57aeb7fdb3f66_JC.exe 28 PID 2636 wrote to memory of 2756 2636 cmd.exe 30 PID 2636 wrote to memory of 2756 2636 cmd.exe 30 PID 2636 wrote to memory of 2756 2636 cmd.exe 30 PID 2636 wrote to memory of 2756 2636 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.b3847e84d2f92ea513b57aeb7fdb3f66_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.b3847e84d2f92ea513b57aeb7fdb3f66_JC.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\WVBJ.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\windows\WVBJ.exeC:\windows\WVBJ.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2756
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD53b5125da578d3ec1227d3240139c58c3
SHA128e6ca9bddbfc81042ae2f302252d98bfcb51953
SHA256f3432ea89a6557fc5ee15b1bfa013a62239615cb9ecb5174189a7c4f790129f1
SHA512d81f1bf3b616d2a5cb2f191e6a58c5c3851046a86e7305b59bb8cacf90d467a06a1a1377884f71a478b732bcac80870f33ff90481f5214ab10099958cb1126ac
-
Filesize
54B
MD55ec1269bb4bca9ef1ff4779d453ead5d
SHA15fe2078222291fdae0124c870b871bbe748f0f00
SHA256dc13c8bc0d106ba00113217ad4cdedab63291f07aece4bc525183b4cf9532e55
SHA5129ed6478a31e7f99e14518888add861944059c0e38b6892f9003f632c4b089dc3c98bc201a0720d98a998b0ce0b990976bad4c0b17fa736049bf0a594f89dab33
-
Filesize
384KB
MD53b5125da578d3ec1227d3240139c58c3
SHA128e6ca9bddbfc81042ae2f302252d98bfcb51953
SHA256f3432ea89a6557fc5ee15b1bfa013a62239615cb9ecb5174189a7c4f790129f1
SHA512d81f1bf3b616d2a5cb2f191e6a58c5c3851046a86e7305b59bb8cacf90d467a06a1a1377884f71a478b732bcac80870f33ff90481f5214ab10099958cb1126ac
-
Filesize
54B
MD55ec1269bb4bca9ef1ff4779d453ead5d
SHA15fe2078222291fdae0124c870b871bbe748f0f00
SHA256dc13c8bc0d106ba00113217ad4cdedab63291f07aece4bc525183b4cf9532e55
SHA5129ed6478a31e7f99e14518888add861944059c0e38b6892f9003f632c4b089dc3c98bc201a0720d98a998b0ce0b990976bad4c0b17fa736049bf0a594f89dab33