General
-
Target
NEAS.48a8de2b7c0d0366b5cda3eef79af0575424bb5ac079551593aa16d4861dea4e_JC.exe
-
Size
1.1MB
-
Sample
231008-vw2lwaeg31
-
MD5
71732eb5647b8cd8a12cd8cd68502255
-
SHA1
f262f14249059df102414bfeaa5d61beffe13b40
-
SHA256
48a8de2b7c0d0366b5cda3eef79af0575424bb5ac079551593aa16d4861dea4e
-
SHA512
b6df55e57e2c785bc713f92e1b1c6743810c0eebe7967c344f1a5a70ae9dc0c9a8843ff69903623a4b359b15ba9c121f6722f902dfd0b661d6ccb9f1853f790d
-
SSDEEP
24576:Y7IvpH41Cl36RgrO/+6WdKHsJYrrg0H+2UbDC:Y72mVpOY3gH2UbD
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.48a8de2b7c0d0366b5cda3eef79af0575424bb5ac079551593aa16d4861dea4e_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.48a8de2b7c0d0366b5cda3eef79af0575424bb5ac079551593aa16d4861dea4e_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
NEAS.48a8de2b7c0d0366b5cda3eef79af0575424bb5ac079551593aa16d4861dea4e_JC.exe
-
Size
1.1MB
-
MD5
71732eb5647b8cd8a12cd8cd68502255
-
SHA1
f262f14249059df102414bfeaa5d61beffe13b40
-
SHA256
48a8de2b7c0d0366b5cda3eef79af0575424bb5ac079551593aa16d4861dea4e
-
SHA512
b6df55e57e2c785bc713f92e1b1c6743810c0eebe7967c344f1a5a70ae9dc0c9a8843ff69903623a4b359b15ba9c121f6722f902dfd0b661d6ccb9f1853f790d
-
SSDEEP
24576:Y7IvpH41Cl36RgrO/+6WdKHsJYrrg0H+2UbDC:Y72mVpOY3gH2UbD
Score9/10-
Checks for common network interception software
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Modifies system executable filetype association
-
Registers COM server for autorun
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Event Triggered Execution
1Change Default File Association
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Event Triggered Execution
1Change Default File Association
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
5Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
1