Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07/10/2023, 11:18

General

  • Target

    NEAS.b3847e84d2f92ea513b57aeb7fdb3f66_JC.exe

  • Size

    384KB

  • MD5

    b3847e84d2f92ea513b57aeb7fdb3f66

  • SHA1

    ae97e1d3c3516a46d024b020c85284ccec40de05

  • SHA256

    bdb342a73ba4e6933ba8430520390027f0f02b12e677364e85a4f78176a3b480

  • SHA512

    6a0d311b23c0140e93745b65a38104c8ea3f324b9b01db121ef3db3cbf2431772d83bf65d8a3c69ca519f1b024773b907cd653e4ba9c293a0d1745ab2e5a7f2e

  • SSDEEP

    6144:iCGJC7dIt/aY5qiP9aFCwESXkEjiPISUOgW9X+hOGzC/NM:iBJyut/kiP9awpWkmZzcukG2/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.b3847e84d2f92ea513b57aeb7fdb3f66_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.b3847e84d2f92ea513b57aeb7fdb3f66_JC.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\windows\WVBJ.exe.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\windows\WVBJ.exe
        C:\windows\WVBJ.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\WVBJ.exe

    Filesize

    384KB

    MD5

    3b5125da578d3ec1227d3240139c58c3

    SHA1

    28e6ca9bddbfc81042ae2f302252d98bfcb51953

    SHA256

    f3432ea89a6557fc5ee15b1bfa013a62239615cb9ecb5174189a7c4f790129f1

    SHA512

    d81f1bf3b616d2a5cb2f191e6a58c5c3851046a86e7305b59bb8cacf90d467a06a1a1377884f71a478b732bcac80870f33ff90481f5214ab10099958cb1126ac

  • C:\Windows\WVBJ.exe.bat

    Filesize

    54B

    MD5

    5ec1269bb4bca9ef1ff4779d453ead5d

    SHA1

    5fe2078222291fdae0124c870b871bbe748f0f00

    SHA256

    dc13c8bc0d106ba00113217ad4cdedab63291f07aece4bc525183b4cf9532e55

    SHA512

    9ed6478a31e7f99e14518888add861944059c0e38b6892f9003f632c4b089dc3c98bc201a0720d98a998b0ce0b990976bad4c0b17fa736049bf0a594f89dab33

  • C:\windows\WVBJ.exe

    Filesize

    384KB

    MD5

    3b5125da578d3ec1227d3240139c58c3

    SHA1

    28e6ca9bddbfc81042ae2f302252d98bfcb51953

    SHA256

    f3432ea89a6557fc5ee15b1bfa013a62239615cb9ecb5174189a7c4f790129f1

    SHA512

    d81f1bf3b616d2a5cb2f191e6a58c5c3851046a86e7305b59bb8cacf90d467a06a1a1377884f71a478b732bcac80870f33ff90481f5214ab10099958cb1126ac

  • C:\windows\WVBJ.exe.bat

    Filesize

    54B

    MD5

    5ec1269bb4bca9ef1ff4779d453ead5d

    SHA1

    5fe2078222291fdae0124c870b871bbe748f0f00

    SHA256

    dc13c8bc0d106ba00113217ad4cdedab63291f07aece4bc525183b4cf9532e55

    SHA512

    9ed6478a31e7f99e14518888add861944059c0e38b6892f9003f632c4b089dc3c98bc201a0720d98a998b0ce0b990976bad4c0b17fa736049bf0a594f89dab33

  • memory/2288-0-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2288-12-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2636-15-0x00000000002A0000-0x00000000002D9000-memory.dmp

    Filesize

    228KB

  • memory/2636-16-0x00000000002A0000-0x00000000002D9000-memory.dmp

    Filesize

    228KB

  • memory/2756-18-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2756-19-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB