Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
09/10/2023, 16:41
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d046b82d135e4cbb494d03252191cab0_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.d046b82d135e4cbb494d03252191cab0_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.d046b82d135e4cbb494d03252191cab0_JC.exe
-
Size
137KB
-
MD5
d046b82d135e4cbb494d03252191cab0
-
SHA1
16cfec23520120181f703d5f4a72c089402edc7f
-
SHA256
b488d308d4bd37902a06e5fd5649402992de32295214516e28214fc75e42709a
-
SHA512
0c8b2e64418e3bfd3f0616e34f766c6a98448456276875f379f5d162df31df3b06ce0d7afee425eccc7511fb3b98a7ac0f10c34617c7458e2ff4b4dd4392eeec
-
SSDEEP
3072:Z6pQc+sSxnTrGadgsFqZeo4pwkhUmZr3hPsOraST:Z6p2sSxTrGvsFUejWyZr3hPswa4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2304 NEAS.d046b82d135e4cbb494d03252191cab0_JC.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2028 2304 NEAS.d046b82d135e4cbb494d03252191cab0_JC.exe 28 PID 2304 wrote to memory of 2028 2304 NEAS.d046b82d135e4cbb494d03252191cab0_JC.exe 28 PID 2304 wrote to memory of 2028 2304 NEAS.d046b82d135e4cbb494d03252191cab0_JC.exe 28 PID 2304 wrote to memory of 2028 2304 NEAS.d046b82d135e4cbb494d03252191cab0_JC.exe 28 PID 2028 wrote to memory of 2716 2028 cmd.exe 30 PID 2028 wrote to memory of 2716 2028 cmd.exe 30 PID 2028 wrote to memory of 2716 2028 cmd.exe 30 PID 2028 wrote to memory of 2716 2028 cmd.exe 30 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2716 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d046b82d135e4cbb494d03252191cab0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d046b82d135e4cbb494d03252191cab0_JC.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\idaD706.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\NEAS.d046b82d135e4cbb494d03252191cab0_JC.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\NEAS.d046b82d135e4cbb494d03252191cab0_JC.exe"3⤵
- Views/modifies file attributes
PID:2716
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58B
MD5fe7379de6d829a94cd247da28c4107b4
SHA1f16e905cdb0a9527890623abbbcf68a8c0f44bbb
SHA2564d6f3345adf9e6d90e008c0a06271383964fed708e161711645d8f8972804c8b
SHA51222ff508d2ab770cd1c9eb6dffb9cfc99e819c957ccb746c96dbd9132e2f955a13f5351b1b6ca51ae04578c49ac9f94374da02a0c48d615a78aa6c834dd804ff2
-
Filesize
58B
MD5fe7379de6d829a94cd247da28c4107b4
SHA1f16e905cdb0a9527890623abbbcf68a8c0f44bbb
SHA2564d6f3345adf9e6d90e008c0a06271383964fed708e161711645d8f8972804c8b
SHA51222ff508d2ab770cd1c9eb6dffb9cfc99e819c957ccb746c96dbd9132e2f955a13f5351b1b6ca51ae04578c49ac9f94374da02a0c48d615a78aa6c834dd804ff2