Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-10-2023 19:03

General

  • Target

    NEAS.99af8e1571edc79df78adcc61f2ece2a_JC.exe

  • Size

    11KB

  • MD5

    99af8e1571edc79df78adcc61f2ece2a

  • SHA1

    4b9090c02fea6ab773dd2ac0c0fd7c1f8a6fdb08

  • SHA256

    079a2f1818dd133e568058df421dcf49c5bd6f075e7fefbbbbf8042dfa446b2f

  • SHA512

    557b82e357748e98ef7a18f7032d04cd0bc6666973d8d10af85247e889bebd4a1161ebfb1ca2ca2650ec8b4e4d38aa4ea09b48f7b31ad76c723f71cb7f81059e

  • SSDEEP

    192:2zNiPKu4dEM4JEqPF/Eke3gr2Ir5Ano/hwj3IeXBdeLrdTYZrj1J4Ig:TICmqPF/Eke3fIr5Ano/hi3IuBALrdTZ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.99af8e1571edc79df78adcc61f2ece2a_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.99af8e1571edc79df78adcc61f2ece2a_JC.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2472
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Executes dropped EXE
      PID:4064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    11KB

    MD5

    42423bdc071073ee013187b017f7a8f4

    SHA1

    501c573bf581e3bd1b4f35d657375366711e41ca

    SHA256

    e7dd7a94cb51ceb880d73e6d4ec956b20c45c00108833c6d9a103de6e0ed81ca

    SHA512

    9ff12ef1a1059ac88f91614cd24e1dce82d26b4c043649240b5b7baa36c653dd1f326d930af2e52a031d0ec034f58c04d1b7abb4db3d31a8637b399f1c8ed2d7

  • C:\Windows\microsofthelp.exe

    Filesize

    11KB

    MD5

    42423bdc071073ee013187b017f7a8f4

    SHA1

    501c573bf581e3bd1b4f35d657375366711e41ca

    SHA256

    e7dd7a94cb51ceb880d73e6d4ec956b20c45c00108833c6d9a103de6e0ed81ca

    SHA512

    9ff12ef1a1059ac88f91614cd24e1dce82d26b4c043649240b5b7baa36c653dd1f326d930af2e52a031d0ec034f58c04d1b7abb4db3d31a8637b399f1c8ed2d7

  • memory/2472-0-0x0000000000400000-0x0000000000402000-memory.dmp

    Filesize

    8KB

  • memory/4064-5-0x0000000000400000-0x0000000000402000-memory.dmp

    Filesize

    8KB