Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2023, 15:27

General

  • Target

    NEAS.3986fafc1246177572db9e6200fbd1ee641e228f7b9dc972d95a195153e1ab80exe_JC.exe

  • Size

    1.1MB

  • MD5

    f6b10a72c68e0af83fdaed9c14eae092

  • SHA1

    a1cb2d4017df5d7ae3fd710f80ebe805e7ce84b9

  • SHA256

    3986fafc1246177572db9e6200fbd1ee641e228f7b9dc972d95a195153e1ab80

  • SHA512

    b9c5fc501e0e0b6a3e6bc65d7f3f571e3d775a70943503f2110a9b17f768c0330e18706ebc612965b3b4f7a889aa85202383e8d7aedf6aafccd201ef962395c2

  • SSDEEP

    24576:UyeCaL5yxt2sVzK6JdB77kokffmPAJXHSrmPeUPd2U3W6rHXyHUSgiL9ga:jeTL5yx8kK6LB77kokffyAJXYmPpl2Ws

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.3986fafc1246177572db9e6200fbd1ee641e228f7b9dc972d95a195153e1ab80exe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.3986fafc1246177572db9e6200fbd1ee641e228f7b9dc972d95a195153e1ab80exe_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1880
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OG8HI44.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OG8HI44.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\yl9Cc55.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\yl9Cc55.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3048
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\BB0mn10.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\BB0mn10.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2700
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Kw13aX0.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Kw13aX0.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2832
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2tM5231.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2tM5231.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2904
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2444
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 268
                7⤵
                • Program crash
                PID:2768
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2724

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OG8HI44.exe

          Filesize

          1021KB

          MD5

          fca3f33c203a14eca161b495f6040bed

          SHA1

          ea725e6bd3092a65bc4ec6fffc59bf169ebd0b29

          SHA256

          3ae2cb89b9843ede7f6aa02ebcc9baab34a0f7533f58a5f14eb1121e68097eee

          SHA512

          1493f59962c19eb280f53ca61a6f69d81bc92419bd240be23106c131f7b4260a0fe331470f7842b4828230f3a6bed4bef2d803d8258ff8a6e3d37fcf4e817c27

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OG8HI44.exe

          Filesize

          1021KB

          MD5

          fca3f33c203a14eca161b495f6040bed

          SHA1

          ea725e6bd3092a65bc4ec6fffc59bf169ebd0b29

          SHA256

          3ae2cb89b9843ede7f6aa02ebcc9baab34a0f7533f58a5f14eb1121e68097eee

          SHA512

          1493f59962c19eb280f53ca61a6f69d81bc92419bd240be23106c131f7b4260a0fe331470f7842b4828230f3a6bed4bef2d803d8258ff8a6e3d37fcf4e817c27

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\yl9Cc55.exe

          Filesize

          725KB

          MD5

          e96b3f85dba1da7d73981a8ffeb3b489

          SHA1

          d5a93d61a7836db949fc2d8cc7ef385344845fbe

          SHA256

          8c639fb6439b66088dcbc5432b33f3ea1bcd859a3a2dcf294c5eee5b8db45659

          SHA512

          c61a36e708a5d5fc3f38671ab7baf6b95182dc4f9177aa4193e1ba2d15cc8190d25fb9db62685f999abe1245dc1e01d6abc47faeabbc5ae5904b568ef7bf4701

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\yl9Cc55.exe

          Filesize

          725KB

          MD5

          e96b3f85dba1da7d73981a8ffeb3b489

          SHA1

          d5a93d61a7836db949fc2d8cc7ef385344845fbe

          SHA256

          8c639fb6439b66088dcbc5432b33f3ea1bcd859a3a2dcf294c5eee5b8db45659

          SHA512

          c61a36e708a5d5fc3f38671ab7baf6b95182dc4f9177aa4193e1ba2d15cc8190d25fb9db62685f999abe1245dc1e01d6abc47faeabbc5ae5904b568ef7bf4701

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\BB0mn10.exe

          Filesize

          479KB

          MD5

          50c41ae48b730196bd38dbfa8ed2a3ab

          SHA1

          aa2e6af7182bd64cbe2cdb0dba8629af71eebe6a

          SHA256

          3d8d71f0797018e588fa779ca608e3a5dddba62c6f6db595ff938a9ab029777f

          SHA512

          872ec4f30ff6e530e800ed655f048955f43a09846382a40d8a66ae9a125c35eb7b67b1ec8e4af684f23784e4730d9c0c156b84cbd3e6cf7cc76cc47a9fa60495

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\BB0mn10.exe

          Filesize

          479KB

          MD5

          50c41ae48b730196bd38dbfa8ed2a3ab

          SHA1

          aa2e6af7182bd64cbe2cdb0dba8629af71eebe6a

          SHA256

          3d8d71f0797018e588fa779ca608e3a5dddba62c6f6db595ff938a9ab029777f

          SHA512

          872ec4f30ff6e530e800ed655f048955f43a09846382a40d8a66ae9a125c35eb7b67b1ec8e4af684f23784e4730d9c0c156b84cbd3e6cf7cc76cc47a9fa60495

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Kw13aX0.exe

          Filesize

          194KB

          MD5

          35d718538c3e1346cb4fcf54aaa0f141

          SHA1

          234c0aa0465c27c190a83936e8e3aa3c4b991224

          SHA256

          97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

          SHA512

          4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Kw13aX0.exe

          Filesize

          194KB

          MD5

          35d718538c3e1346cb4fcf54aaa0f141

          SHA1

          234c0aa0465c27c190a83936e8e3aa3c4b991224

          SHA256

          97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

          SHA512

          4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2tM5231.exe

          Filesize

          423KB

          MD5

          61088520a959421e5cf8dfa74fe31386

          SHA1

          ee6899a8726356ead04d7d05baec65b16b958e36

          SHA256

          78d2501637461e38eb9ab992242212b5e7aadfbb160b06bbffd5b1a6f3cf8ef7

          SHA512

          281b4bbf005989c74125b14b8fa2c620e808ae835fcde6dafbb1f7fff9bce1c78474697e74d10bce7e12e94fbda914dbfa83d45494fef0af3c53c4a518b86ab3

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2tM5231.exe

          Filesize

          423KB

          MD5

          61088520a959421e5cf8dfa74fe31386

          SHA1

          ee6899a8726356ead04d7d05baec65b16b958e36

          SHA256

          78d2501637461e38eb9ab992242212b5e7aadfbb160b06bbffd5b1a6f3cf8ef7

          SHA512

          281b4bbf005989c74125b14b8fa2c620e808ae835fcde6dafbb1f7fff9bce1c78474697e74d10bce7e12e94fbda914dbfa83d45494fef0af3c53c4a518b86ab3

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2tM5231.exe

          Filesize

          423KB

          MD5

          61088520a959421e5cf8dfa74fe31386

          SHA1

          ee6899a8726356ead04d7d05baec65b16b958e36

          SHA256

          78d2501637461e38eb9ab992242212b5e7aadfbb160b06bbffd5b1a6f3cf8ef7

          SHA512

          281b4bbf005989c74125b14b8fa2c620e808ae835fcde6dafbb1f7fff9bce1c78474697e74d10bce7e12e94fbda914dbfa83d45494fef0af3c53c4a518b86ab3

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\OG8HI44.exe

          Filesize

          1021KB

          MD5

          fca3f33c203a14eca161b495f6040bed

          SHA1

          ea725e6bd3092a65bc4ec6fffc59bf169ebd0b29

          SHA256

          3ae2cb89b9843ede7f6aa02ebcc9baab34a0f7533f58a5f14eb1121e68097eee

          SHA512

          1493f59962c19eb280f53ca61a6f69d81bc92419bd240be23106c131f7b4260a0fe331470f7842b4828230f3a6bed4bef2d803d8258ff8a6e3d37fcf4e817c27

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\OG8HI44.exe

          Filesize

          1021KB

          MD5

          fca3f33c203a14eca161b495f6040bed

          SHA1

          ea725e6bd3092a65bc4ec6fffc59bf169ebd0b29

          SHA256

          3ae2cb89b9843ede7f6aa02ebcc9baab34a0f7533f58a5f14eb1121e68097eee

          SHA512

          1493f59962c19eb280f53ca61a6f69d81bc92419bd240be23106c131f7b4260a0fe331470f7842b4828230f3a6bed4bef2d803d8258ff8a6e3d37fcf4e817c27

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\yl9Cc55.exe

          Filesize

          725KB

          MD5

          e96b3f85dba1da7d73981a8ffeb3b489

          SHA1

          d5a93d61a7836db949fc2d8cc7ef385344845fbe

          SHA256

          8c639fb6439b66088dcbc5432b33f3ea1bcd859a3a2dcf294c5eee5b8db45659

          SHA512

          c61a36e708a5d5fc3f38671ab7baf6b95182dc4f9177aa4193e1ba2d15cc8190d25fb9db62685f999abe1245dc1e01d6abc47faeabbc5ae5904b568ef7bf4701

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\yl9Cc55.exe

          Filesize

          725KB

          MD5

          e96b3f85dba1da7d73981a8ffeb3b489

          SHA1

          d5a93d61a7836db949fc2d8cc7ef385344845fbe

          SHA256

          8c639fb6439b66088dcbc5432b33f3ea1bcd859a3a2dcf294c5eee5b8db45659

          SHA512

          c61a36e708a5d5fc3f38671ab7baf6b95182dc4f9177aa4193e1ba2d15cc8190d25fb9db62685f999abe1245dc1e01d6abc47faeabbc5ae5904b568ef7bf4701

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\BB0mn10.exe

          Filesize

          479KB

          MD5

          50c41ae48b730196bd38dbfa8ed2a3ab

          SHA1

          aa2e6af7182bd64cbe2cdb0dba8629af71eebe6a

          SHA256

          3d8d71f0797018e588fa779ca608e3a5dddba62c6f6db595ff938a9ab029777f

          SHA512

          872ec4f30ff6e530e800ed655f048955f43a09846382a40d8a66ae9a125c35eb7b67b1ec8e4af684f23784e4730d9c0c156b84cbd3e6cf7cc76cc47a9fa60495

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\BB0mn10.exe

          Filesize

          479KB

          MD5

          50c41ae48b730196bd38dbfa8ed2a3ab

          SHA1

          aa2e6af7182bd64cbe2cdb0dba8629af71eebe6a

          SHA256

          3d8d71f0797018e588fa779ca608e3a5dddba62c6f6db595ff938a9ab029777f

          SHA512

          872ec4f30ff6e530e800ed655f048955f43a09846382a40d8a66ae9a125c35eb7b67b1ec8e4af684f23784e4730d9c0c156b84cbd3e6cf7cc76cc47a9fa60495

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Kw13aX0.exe

          Filesize

          194KB

          MD5

          35d718538c3e1346cb4fcf54aaa0f141

          SHA1

          234c0aa0465c27c190a83936e8e3aa3c4b991224

          SHA256

          97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

          SHA512

          4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Kw13aX0.exe

          Filesize

          194KB

          MD5

          35d718538c3e1346cb4fcf54aaa0f141

          SHA1

          234c0aa0465c27c190a83936e8e3aa3c4b991224

          SHA256

          97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

          SHA512

          4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2tM5231.exe

          Filesize

          423KB

          MD5

          61088520a959421e5cf8dfa74fe31386

          SHA1

          ee6899a8726356ead04d7d05baec65b16b958e36

          SHA256

          78d2501637461e38eb9ab992242212b5e7aadfbb160b06bbffd5b1a6f3cf8ef7

          SHA512

          281b4bbf005989c74125b14b8fa2c620e808ae835fcde6dafbb1f7fff9bce1c78474697e74d10bce7e12e94fbda914dbfa83d45494fef0af3c53c4a518b86ab3

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2tM5231.exe

          Filesize

          423KB

          MD5

          61088520a959421e5cf8dfa74fe31386

          SHA1

          ee6899a8726356ead04d7d05baec65b16b958e36

          SHA256

          78d2501637461e38eb9ab992242212b5e7aadfbb160b06bbffd5b1a6f3cf8ef7

          SHA512

          281b4bbf005989c74125b14b8fa2c620e808ae835fcde6dafbb1f7fff9bce1c78474697e74d10bce7e12e94fbda914dbfa83d45494fef0af3c53c4a518b86ab3

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2tM5231.exe

          Filesize

          423KB

          MD5

          61088520a959421e5cf8dfa74fe31386

          SHA1

          ee6899a8726356ead04d7d05baec65b16b958e36

          SHA256

          78d2501637461e38eb9ab992242212b5e7aadfbb160b06bbffd5b1a6f3cf8ef7

          SHA512

          281b4bbf005989c74125b14b8fa2c620e808ae835fcde6dafbb1f7fff9bce1c78474697e74d10bce7e12e94fbda914dbfa83d45494fef0af3c53c4a518b86ab3

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2tM5231.exe

          Filesize

          423KB

          MD5

          61088520a959421e5cf8dfa74fe31386

          SHA1

          ee6899a8726356ead04d7d05baec65b16b958e36

          SHA256

          78d2501637461e38eb9ab992242212b5e7aadfbb160b06bbffd5b1a6f3cf8ef7

          SHA512

          281b4bbf005989c74125b14b8fa2c620e808ae835fcde6dafbb1f7fff9bce1c78474697e74d10bce7e12e94fbda914dbfa83d45494fef0af3c53c4a518b86ab3

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2tM5231.exe

          Filesize

          423KB

          MD5

          61088520a959421e5cf8dfa74fe31386

          SHA1

          ee6899a8726356ead04d7d05baec65b16b958e36

          SHA256

          78d2501637461e38eb9ab992242212b5e7aadfbb160b06bbffd5b1a6f3cf8ef7

          SHA512

          281b4bbf005989c74125b14b8fa2c620e808ae835fcde6dafbb1f7fff9bce1c78474697e74d10bce7e12e94fbda914dbfa83d45494fef0af3c53c4a518b86ab3

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2tM5231.exe

          Filesize

          423KB

          MD5

          61088520a959421e5cf8dfa74fe31386

          SHA1

          ee6899a8726356ead04d7d05baec65b16b958e36

          SHA256

          78d2501637461e38eb9ab992242212b5e7aadfbb160b06bbffd5b1a6f3cf8ef7

          SHA512

          281b4bbf005989c74125b14b8fa2c620e808ae835fcde6dafbb1f7fff9bce1c78474697e74d10bce7e12e94fbda914dbfa83d45494fef0af3c53c4a518b86ab3

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2tM5231.exe

          Filesize

          423KB

          MD5

          61088520a959421e5cf8dfa74fe31386

          SHA1

          ee6899a8726356ead04d7d05baec65b16b958e36

          SHA256

          78d2501637461e38eb9ab992242212b5e7aadfbb160b06bbffd5b1a6f3cf8ef7

          SHA512

          281b4bbf005989c74125b14b8fa2c620e808ae835fcde6dafbb1f7fff9bce1c78474697e74d10bce7e12e94fbda914dbfa83d45494fef0af3c53c4a518b86ab3

        • memory/2444-79-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2444-81-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2444-90-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2444-88-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2444-80-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2444-82-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2444-83-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2444-86-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2444-85-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2444-84-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2832-57-0x0000000002280000-0x0000000002296000-memory.dmp

          Filesize

          88KB

        • memory/2832-65-0x0000000002280000-0x0000000002296000-memory.dmp

          Filesize

          88KB

        • memory/2832-47-0x0000000002280000-0x0000000002296000-memory.dmp

          Filesize

          88KB

        • memory/2832-45-0x0000000002280000-0x0000000002296000-memory.dmp

          Filesize

          88KB

        • memory/2832-51-0x0000000002280000-0x0000000002296000-memory.dmp

          Filesize

          88KB

        • memory/2832-53-0x0000000002280000-0x0000000002296000-memory.dmp

          Filesize

          88KB

        • memory/2832-55-0x0000000002280000-0x0000000002296000-memory.dmp

          Filesize

          88KB

        • memory/2832-59-0x0000000002280000-0x0000000002296000-memory.dmp

          Filesize

          88KB

        • memory/2832-63-0x0000000002280000-0x0000000002296000-memory.dmp

          Filesize

          88KB

        • memory/2832-49-0x0000000002280000-0x0000000002296000-memory.dmp

          Filesize

          88KB

        • memory/2832-69-0x0000000002280000-0x0000000002296000-memory.dmp

          Filesize

          88KB

        • memory/2832-67-0x0000000002280000-0x0000000002296000-memory.dmp

          Filesize

          88KB

        • memory/2832-61-0x0000000002280000-0x0000000002296000-memory.dmp

          Filesize

          88KB

        • memory/2832-43-0x0000000002280000-0x0000000002296000-memory.dmp

          Filesize

          88KB

        • memory/2832-42-0x0000000002280000-0x0000000002296000-memory.dmp

          Filesize

          88KB

        • memory/2832-41-0x0000000002280000-0x000000000229C000-memory.dmp

          Filesize

          112KB

        • memory/2832-40-0x0000000000390000-0x00000000003AE000-memory.dmp

          Filesize

          120KB