Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    08/10/2023, 17:01

General

  • Target

    NEAS.f9861304835d7d37cc9bd191d3d42e825801d7f60569c5d10bffb4ed951bc42d_JC.exe

  • Size

    1.2MB

  • MD5

    607a1754f40a4308c3da03fc73bc177f

  • SHA1

    3234130ca6446ef74f74a930abcf186946b1733a

  • SHA256

    f9861304835d7d37cc9bd191d3d42e825801d7f60569c5d10bffb4ed951bc42d

  • SHA512

    6a94ac31bde01e1b4920b4c17160971f60fbc39969122e4047640116111d456e33bc701626f15b3352cefe0aefce0a85ef882be435a23c74108a6b24aee13a87

  • SSDEEP

    24576:ZyXIQqQEE3fPEuvH3aaCch1a59jVMcN3WDsiEdOeHoX8X2K/VlWb:MX7PFh1a55GcNmbuOeIM

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.f9861304835d7d37cc9bd191d3d42e825801d7f60569c5d10bffb4ed951bc42d_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.f9861304835d7d37cc9bd191d3d42e825801d7f60569c5d10bffb4ed951bc42d_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Cz8gB6qp.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Cz8gB6qp.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2196
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\YR7BU0qL.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\YR7BU0qL.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ys0ly9rj.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ys0ly9rj.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2608
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\km1Gc7PD.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\km1Gc7PD.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2872
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1qZ73jS6.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1qZ73jS6.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2708
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1588
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 268
                  8⤵
                  • Program crash
                  PID:2580
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 284
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Cz8gB6qp.exe

    Filesize

    1.1MB

    MD5

    85858ff08c378147b96595f7c4a035bf

    SHA1

    d39b8d3f2de108d720c82bcdcb46cd406e399a3d

    SHA256

    3fb4cf051a73e45a31e9151ac4ce7640d64efa596281eac78b1aa53e9e332800

    SHA512

    e33285b29bc5a83a9b6af2a17fd0dde4a30fab01b769611bb316f5c92e5e79b13b91962d37a606c30b59062332afcc6abe0c484d569c84f830dfd97868169aac

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Cz8gB6qp.exe

    Filesize

    1.1MB

    MD5

    85858ff08c378147b96595f7c4a035bf

    SHA1

    d39b8d3f2de108d720c82bcdcb46cd406e399a3d

    SHA256

    3fb4cf051a73e45a31e9151ac4ce7640d64efa596281eac78b1aa53e9e332800

    SHA512

    e33285b29bc5a83a9b6af2a17fd0dde4a30fab01b769611bb316f5c92e5e79b13b91962d37a606c30b59062332afcc6abe0c484d569c84f830dfd97868169aac

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\YR7BU0qL.exe

    Filesize

    937KB

    MD5

    392943ce36ab7ec1a8551b9dbabb3ed0

    SHA1

    0ad214833bd7138019006430f330d1a5bf7c733e

    SHA256

    1733290ed1cfef38ae2e67e00360c3609faed834c64a5172304f05864bc1a652

    SHA512

    438f0725ebb1e1622ce9a3c9a439f8f2c7f4ad77cc967c49b95cc27737a095d49a1f72c55671f92b0d5dcbf303d5651f1e63a626badd6df7be2698be91d36358

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\YR7BU0qL.exe

    Filesize

    937KB

    MD5

    392943ce36ab7ec1a8551b9dbabb3ed0

    SHA1

    0ad214833bd7138019006430f330d1a5bf7c733e

    SHA256

    1733290ed1cfef38ae2e67e00360c3609faed834c64a5172304f05864bc1a652

    SHA512

    438f0725ebb1e1622ce9a3c9a439f8f2c7f4ad77cc967c49b95cc27737a095d49a1f72c55671f92b0d5dcbf303d5651f1e63a626badd6df7be2698be91d36358

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ys0ly9rj.exe

    Filesize

    640KB

    MD5

    4a21d7b963f9644ef19c844b3e52afc2

    SHA1

    87aa7899e653ce5389ddffa17f4990257284fb79

    SHA256

    7988091b60bd3e9e2a45ef3fcf4bb1d5c7c7c5d04c5dc446a32fec43838a5c9b

    SHA512

    0d28a7cc01b3f57a55bcd167a8886c63cbddd629a6b1107f23e5c627f8fad683d693d10ae2e1eff7e99a561fbd2914f924379ae60909cc75b67b1d9e591bd571

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ys0ly9rj.exe

    Filesize

    640KB

    MD5

    4a21d7b963f9644ef19c844b3e52afc2

    SHA1

    87aa7899e653ce5389ddffa17f4990257284fb79

    SHA256

    7988091b60bd3e9e2a45ef3fcf4bb1d5c7c7c5d04c5dc446a32fec43838a5c9b

    SHA512

    0d28a7cc01b3f57a55bcd167a8886c63cbddd629a6b1107f23e5c627f8fad683d693d10ae2e1eff7e99a561fbd2914f924379ae60909cc75b67b1d9e591bd571

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\km1Gc7PD.exe

    Filesize

    444KB

    MD5

    62cb5abe1a7a14a455b7bcbde88afee6

    SHA1

    5761fe51f10b934d99810fdd8d051f1a0b129aa8

    SHA256

    7ce62a9574ca774ba9c6234c75799fd5cb2c153c6f1e40a65e1bea1a9c2219e1

    SHA512

    59f36fd993e5ef000ac8c7bb8c87583a4d99385e8eec8438345c9b26c70ffcb050734c1770f4e6449370ab0a5ce5d77ac2cf42a52cfbf6751db261642c051ece

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\km1Gc7PD.exe

    Filesize

    444KB

    MD5

    62cb5abe1a7a14a455b7bcbde88afee6

    SHA1

    5761fe51f10b934d99810fdd8d051f1a0b129aa8

    SHA256

    7ce62a9574ca774ba9c6234c75799fd5cb2c153c6f1e40a65e1bea1a9c2219e1

    SHA512

    59f36fd993e5ef000ac8c7bb8c87583a4d99385e8eec8438345c9b26c70ffcb050734c1770f4e6449370ab0a5ce5d77ac2cf42a52cfbf6751db261642c051ece

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1qZ73jS6.exe

    Filesize

    423KB

    MD5

    52a15b134a85304b9b9c9649f422f5c8

    SHA1

    50de51dff4e84c9c139462c8841c93fa873bebd7

    SHA256

    97b259b771e15d73f8634f726cd5e2aea0a1c38d640742c00051f22319625ae1

    SHA512

    4ea2707da73c53869f0d4c302d0d59b74a7234bd9165804a1255e9aec217df4c7423e818dd780b93e28f8f6680ec766096782894ff7de436509b09ff61113b30

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1qZ73jS6.exe

    Filesize

    423KB

    MD5

    52a15b134a85304b9b9c9649f422f5c8

    SHA1

    50de51dff4e84c9c139462c8841c93fa873bebd7

    SHA256

    97b259b771e15d73f8634f726cd5e2aea0a1c38d640742c00051f22319625ae1

    SHA512

    4ea2707da73c53869f0d4c302d0d59b74a7234bd9165804a1255e9aec217df4c7423e818dd780b93e28f8f6680ec766096782894ff7de436509b09ff61113b30

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1qZ73jS6.exe

    Filesize

    423KB

    MD5

    52a15b134a85304b9b9c9649f422f5c8

    SHA1

    50de51dff4e84c9c139462c8841c93fa873bebd7

    SHA256

    97b259b771e15d73f8634f726cd5e2aea0a1c38d640742c00051f22319625ae1

    SHA512

    4ea2707da73c53869f0d4c302d0d59b74a7234bd9165804a1255e9aec217df4c7423e818dd780b93e28f8f6680ec766096782894ff7de436509b09ff61113b30

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Cz8gB6qp.exe

    Filesize

    1.1MB

    MD5

    85858ff08c378147b96595f7c4a035bf

    SHA1

    d39b8d3f2de108d720c82bcdcb46cd406e399a3d

    SHA256

    3fb4cf051a73e45a31e9151ac4ce7640d64efa596281eac78b1aa53e9e332800

    SHA512

    e33285b29bc5a83a9b6af2a17fd0dde4a30fab01b769611bb316f5c92e5e79b13b91962d37a606c30b59062332afcc6abe0c484d569c84f830dfd97868169aac

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Cz8gB6qp.exe

    Filesize

    1.1MB

    MD5

    85858ff08c378147b96595f7c4a035bf

    SHA1

    d39b8d3f2de108d720c82bcdcb46cd406e399a3d

    SHA256

    3fb4cf051a73e45a31e9151ac4ce7640d64efa596281eac78b1aa53e9e332800

    SHA512

    e33285b29bc5a83a9b6af2a17fd0dde4a30fab01b769611bb316f5c92e5e79b13b91962d37a606c30b59062332afcc6abe0c484d569c84f830dfd97868169aac

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\YR7BU0qL.exe

    Filesize

    937KB

    MD5

    392943ce36ab7ec1a8551b9dbabb3ed0

    SHA1

    0ad214833bd7138019006430f330d1a5bf7c733e

    SHA256

    1733290ed1cfef38ae2e67e00360c3609faed834c64a5172304f05864bc1a652

    SHA512

    438f0725ebb1e1622ce9a3c9a439f8f2c7f4ad77cc967c49b95cc27737a095d49a1f72c55671f92b0d5dcbf303d5651f1e63a626badd6df7be2698be91d36358

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\YR7BU0qL.exe

    Filesize

    937KB

    MD5

    392943ce36ab7ec1a8551b9dbabb3ed0

    SHA1

    0ad214833bd7138019006430f330d1a5bf7c733e

    SHA256

    1733290ed1cfef38ae2e67e00360c3609faed834c64a5172304f05864bc1a652

    SHA512

    438f0725ebb1e1622ce9a3c9a439f8f2c7f4ad77cc967c49b95cc27737a095d49a1f72c55671f92b0d5dcbf303d5651f1e63a626badd6df7be2698be91d36358

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Ys0ly9rj.exe

    Filesize

    640KB

    MD5

    4a21d7b963f9644ef19c844b3e52afc2

    SHA1

    87aa7899e653ce5389ddffa17f4990257284fb79

    SHA256

    7988091b60bd3e9e2a45ef3fcf4bb1d5c7c7c5d04c5dc446a32fec43838a5c9b

    SHA512

    0d28a7cc01b3f57a55bcd167a8886c63cbddd629a6b1107f23e5c627f8fad683d693d10ae2e1eff7e99a561fbd2914f924379ae60909cc75b67b1d9e591bd571

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Ys0ly9rj.exe

    Filesize

    640KB

    MD5

    4a21d7b963f9644ef19c844b3e52afc2

    SHA1

    87aa7899e653ce5389ddffa17f4990257284fb79

    SHA256

    7988091b60bd3e9e2a45ef3fcf4bb1d5c7c7c5d04c5dc446a32fec43838a5c9b

    SHA512

    0d28a7cc01b3f57a55bcd167a8886c63cbddd629a6b1107f23e5c627f8fad683d693d10ae2e1eff7e99a561fbd2914f924379ae60909cc75b67b1d9e591bd571

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\km1Gc7PD.exe

    Filesize

    444KB

    MD5

    62cb5abe1a7a14a455b7bcbde88afee6

    SHA1

    5761fe51f10b934d99810fdd8d051f1a0b129aa8

    SHA256

    7ce62a9574ca774ba9c6234c75799fd5cb2c153c6f1e40a65e1bea1a9c2219e1

    SHA512

    59f36fd993e5ef000ac8c7bb8c87583a4d99385e8eec8438345c9b26c70ffcb050734c1770f4e6449370ab0a5ce5d77ac2cf42a52cfbf6751db261642c051ece

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\km1Gc7PD.exe

    Filesize

    444KB

    MD5

    62cb5abe1a7a14a455b7bcbde88afee6

    SHA1

    5761fe51f10b934d99810fdd8d051f1a0b129aa8

    SHA256

    7ce62a9574ca774ba9c6234c75799fd5cb2c153c6f1e40a65e1bea1a9c2219e1

    SHA512

    59f36fd993e5ef000ac8c7bb8c87583a4d99385e8eec8438345c9b26c70ffcb050734c1770f4e6449370ab0a5ce5d77ac2cf42a52cfbf6751db261642c051ece

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1qZ73jS6.exe

    Filesize

    423KB

    MD5

    52a15b134a85304b9b9c9649f422f5c8

    SHA1

    50de51dff4e84c9c139462c8841c93fa873bebd7

    SHA256

    97b259b771e15d73f8634f726cd5e2aea0a1c38d640742c00051f22319625ae1

    SHA512

    4ea2707da73c53869f0d4c302d0d59b74a7234bd9165804a1255e9aec217df4c7423e818dd780b93e28f8f6680ec766096782894ff7de436509b09ff61113b30

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1qZ73jS6.exe

    Filesize

    423KB

    MD5

    52a15b134a85304b9b9c9649f422f5c8

    SHA1

    50de51dff4e84c9c139462c8841c93fa873bebd7

    SHA256

    97b259b771e15d73f8634f726cd5e2aea0a1c38d640742c00051f22319625ae1

    SHA512

    4ea2707da73c53869f0d4c302d0d59b74a7234bd9165804a1255e9aec217df4c7423e818dd780b93e28f8f6680ec766096782894ff7de436509b09ff61113b30

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1qZ73jS6.exe

    Filesize

    423KB

    MD5

    52a15b134a85304b9b9c9649f422f5c8

    SHA1

    50de51dff4e84c9c139462c8841c93fa873bebd7

    SHA256

    97b259b771e15d73f8634f726cd5e2aea0a1c38d640742c00051f22319625ae1

    SHA512

    4ea2707da73c53869f0d4c302d0d59b74a7234bd9165804a1255e9aec217df4c7423e818dd780b93e28f8f6680ec766096782894ff7de436509b09ff61113b30

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1qZ73jS6.exe

    Filesize

    423KB

    MD5

    52a15b134a85304b9b9c9649f422f5c8

    SHA1

    50de51dff4e84c9c139462c8841c93fa873bebd7

    SHA256

    97b259b771e15d73f8634f726cd5e2aea0a1c38d640742c00051f22319625ae1

    SHA512

    4ea2707da73c53869f0d4c302d0d59b74a7234bd9165804a1255e9aec217df4c7423e818dd780b93e28f8f6680ec766096782894ff7de436509b09ff61113b30

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1qZ73jS6.exe

    Filesize

    423KB

    MD5

    52a15b134a85304b9b9c9649f422f5c8

    SHA1

    50de51dff4e84c9c139462c8841c93fa873bebd7

    SHA256

    97b259b771e15d73f8634f726cd5e2aea0a1c38d640742c00051f22319625ae1

    SHA512

    4ea2707da73c53869f0d4c302d0d59b74a7234bd9165804a1255e9aec217df4c7423e818dd780b93e28f8f6680ec766096782894ff7de436509b09ff61113b30

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1qZ73jS6.exe

    Filesize

    423KB

    MD5

    52a15b134a85304b9b9c9649f422f5c8

    SHA1

    50de51dff4e84c9c139462c8841c93fa873bebd7

    SHA256

    97b259b771e15d73f8634f726cd5e2aea0a1c38d640742c00051f22319625ae1

    SHA512

    4ea2707da73c53869f0d4c302d0d59b74a7234bd9165804a1255e9aec217df4c7423e818dd780b93e28f8f6680ec766096782894ff7de436509b09ff61113b30

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1qZ73jS6.exe

    Filesize

    423KB

    MD5

    52a15b134a85304b9b9c9649f422f5c8

    SHA1

    50de51dff4e84c9c139462c8841c93fa873bebd7

    SHA256

    97b259b771e15d73f8634f726cd5e2aea0a1c38d640742c00051f22319625ae1

    SHA512

    4ea2707da73c53869f0d4c302d0d59b74a7234bd9165804a1255e9aec217df4c7423e818dd780b93e28f8f6680ec766096782894ff7de436509b09ff61113b30

  • memory/1588-56-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1588-59-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/1588-58-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1588-60-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1588-62-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1588-64-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1588-57-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1588-55-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1588-54-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1588-53-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB