Analysis

  • max time kernel
    136s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2023, 19:14

General

  • Target

    NEAS.a66fdece178d004b61b36b6153e8691b_JC.exe

  • Size

    73KB

  • MD5

    a66fdece178d004b61b36b6153e8691b

  • SHA1

    692c0f84fa635fdc609eb612fa8fbd1e2d796ad1

  • SHA256

    549ec1e10cc5185a294d4cd5c8a338856fbb10fea518c91c1ba2a845bc04ea60

  • SHA512

    b4aec5eff290f1fe76308d13e197f7c2659f3f8be026b22319855db3d0075a38af1aa815f6d8f4c3517eef578a6f842d902a6bb9194b0f3e2adc615fc344bbbb

  • SSDEEP

    1536:TKIXThfdjYQjG9m7QHRh3O58biCRcT262Cbcz/q:HDbv7QHRh3O5CbcafCwz/q

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 16 IoCs
  • Executes dropped EXE 8 IoCs
  • Drops file in System32 directory 24 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 27 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.a66fdece178d004b61b36b6153e8691b_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.a66fdece178d004b61b36b6153e8691b_JC.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Windows\SysWOW64\Djdmffnn.exe
      C:\Windows\system32\Djdmffnn.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4256
      • C:\Windows\SysWOW64\Dhhnpjmh.exe
        C:\Windows\system32\Dhhnpjmh.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:224
        • C:\Windows\SysWOW64\Dmefhako.exe
          C:\Windows\system32\Dmefhako.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4400
          • C:\Windows\SysWOW64\Dodbbdbb.exe
            C:\Windows\system32\Dodbbdbb.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:3836
            • C:\Windows\SysWOW64\Dhmgki32.exe
              C:\Windows\system32\Dhmgki32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:4304
              • C:\Windows\SysWOW64\Dogogcpo.exe
                C:\Windows\system32\Dogogcpo.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:4872
                • C:\Windows\SysWOW64\Dhocqigp.exe
                  C:\Windows\system32\Dhocqigp.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:2028
                  • C:\Windows\SysWOW64\Dmllipeg.exe
                    C:\Windows\system32\Dmllipeg.exe
                    9⤵
                    • Executes dropped EXE
                    PID:2184
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 396
                      10⤵
                      • Program crash
                      PID:4116
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2184 -ip 2184
    1⤵
      PID:4472

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Dhhnpjmh.exe

      Filesize

      73KB

      MD5

      4fff64368992ca7309cc60098400932b

      SHA1

      30cd506723c88754b7192ddaf30a33dd01ab156a

      SHA256

      eb4202dd3179e9279f29e7641c9936b6826436c4efb6cf5d07a89c88cfe624cc

      SHA512

      2a91ef4fef83165ab9b07ce8b7b010d0ad3b08c7c7035af7a5451a33680a8da4f36553cae9a74eb3d913bba67acbbe0e42587bf5967ce3164892942636dcc08f

    • C:\Windows\SysWOW64\Dhhnpjmh.exe

      Filesize

      73KB

      MD5

      4fff64368992ca7309cc60098400932b

      SHA1

      30cd506723c88754b7192ddaf30a33dd01ab156a

      SHA256

      eb4202dd3179e9279f29e7641c9936b6826436c4efb6cf5d07a89c88cfe624cc

      SHA512

      2a91ef4fef83165ab9b07ce8b7b010d0ad3b08c7c7035af7a5451a33680a8da4f36553cae9a74eb3d913bba67acbbe0e42587bf5967ce3164892942636dcc08f

    • C:\Windows\SysWOW64\Dhmgki32.exe

      Filesize

      73KB

      MD5

      54d8adb7b1b209a68bbcb588facbda64

      SHA1

      a0c7d13dd2d8e8b05cc930c8b9ae61daa2c7130d

      SHA256

      4e67cb3bab449622476dce3d9b4f1214bb9433224d4a48f94ba9f57d2d6c55b6

      SHA512

      3c4c412ecfa8e04eff0b5d1fe11781ce266a8f90ab35c6c86fbd374e7345cfe21b7452be08605529f70784fbc22c1ace5b9eb3626ada61f0d517536fd012b3ee

    • C:\Windows\SysWOW64\Dhmgki32.exe

      Filesize

      73KB

      MD5

      54d8adb7b1b209a68bbcb588facbda64

      SHA1

      a0c7d13dd2d8e8b05cc930c8b9ae61daa2c7130d

      SHA256

      4e67cb3bab449622476dce3d9b4f1214bb9433224d4a48f94ba9f57d2d6c55b6

      SHA512

      3c4c412ecfa8e04eff0b5d1fe11781ce266a8f90ab35c6c86fbd374e7345cfe21b7452be08605529f70784fbc22c1ace5b9eb3626ada61f0d517536fd012b3ee

    • C:\Windows\SysWOW64\Dhocqigp.exe

      Filesize

      73KB

      MD5

      98bfce0e6a351db62022619993f0ed10

      SHA1

      d7c8ea743628ce068ff866513977066e3be12648

      SHA256

      4cff9a5ff16dcbdfa6dcf19d5af624a9107c913674566febbb90ce674e426b53

      SHA512

      2cb7da43ed096dd86b07dbf030fdbaf134fee427a399a022aeb4484e53d9dc0e3d900956a4bedc16323756eabdebb10e86dd1874e2874e9dd91f029fe3395903

    • C:\Windows\SysWOW64\Dhocqigp.exe

      Filesize

      73KB

      MD5

      98bfce0e6a351db62022619993f0ed10

      SHA1

      d7c8ea743628ce068ff866513977066e3be12648

      SHA256

      4cff9a5ff16dcbdfa6dcf19d5af624a9107c913674566febbb90ce674e426b53

      SHA512

      2cb7da43ed096dd86b07dbf030fdbaf134fee427a399a022aeb4484e53d9dc0e3d900956a4bedc16323756eabdebb10e86dd1874e2874e9dd91f029fe3395903

    • C:\Windows\SysWOW64\Djdmffnn.exe

      Filesize

      73KB

      MD5

      676b93e469c1d90d1199c150f8e68be9

      SHA1

      8b6b1d13dcabf52ad0964ff237a7a4ef49782c1c

      SHA256

      9920108b69e4ef6e83f90933807be855edc52ddee162d8b8367db41fd4f2f264

      SHA512

      56606198710be336b4ab09259bb81c80afd53066244e6872e817067d158908ab9feb71b455473df6db53d88343724479f61b9b98e50b743d01b0e4bc10ce2ff8

    • C:\Windows\SysWOW64\Djdmffnn.exe

      Filesize

      73KB

      MD5

      676b93e469c1d90d1199c150f8e68be9

      SHA1

      8b6b1d13dcabf52ad0964ff237a7a4ef49782c1c

      SHA256

      9920108b69e4ef6e83f90933807be855edc52ddee162d8b8367db41fd4f2f264

      SHA512

      56606198710be336b4ab09259bb81c80afd53066244e6872e817067d158908ab9feb71b455473df6db53d88343724479f61b9b98e50b743d01b0e4bc10ce2ff8

    • C:\Windows\SysWOW64\Dmefhako.exe

      Filesize

      73KB

      MD5

      b4849df07f2e9e5fbdb49e1dba71633a

      SHA1

      8f18d73b2db50698d1d528e1e2ff5c66743f2357

      SHA256

      7e5b4566282566557c27616b58de4d9100dab71a126e8ab3b60339286f52f1a5

      SHA512

      8ca6bf15eabae58f710400fa04384faef4fdfa7bcd2516cd1d6983abe59a2d270862aaf6c178e1d5632e805e2c13aa19063bd1c727eeb3f2f7f1e8e2b5e26fc4

    • C:\Windows\SysWOW64\Dmefhako.exe

      Filesize

      73KB

      MD5

      b4849df07f2e9e5fbdb49e1dba71633a

      SHA1

      8f18d73b2db50698d1d528e1e2ff5c66743f2357

      SHA256

      7e5b4566282566557c27616b58de4d9100dab71a126e8ab3b60339286f52f1a5

      SHA512

      8ca6bf15eabae58f710400fa04384faef4fdfa7bcd2516cd1d6983abe59a2d270862aaf6c178e1d5632e805e2c13aa19063bd1c727eeb3f2f7f1e8e2b5e26fc4

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      73KB

      MD5

      dacdc396dceaca668e77826b8edfc07b

      SHA1

      f60babcbbb3a9975eab4c06863de248bbc44c490

      SHA256

      45998c8adc0b288d9d44465b05c461bbc9d33bee01e139e2fc9f6492ce2ad110

      SHA512

      5cd466d9986af0b13d5dd16b609ef0669365f0c431a133db5f12eb789f0c8f0f1badad8a92f6101053f0a44f73785409ae02a40a93fdf5f39637e974958c57a3

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      73KB

      MD5

      dacdc396dceaca668e77826b8edfc07b

      SHA1

      f60babcbbb3a9975eab4c06863de248bbc44c490

      SHA256

      45998c8adc0b288d9d44465b05c461bbc9d33bee01e139e2fc9f6492ce2ad110

      SHA512

      5cd466d9986af0b13d5dd16b609ef0669365f0c431a133db5f12eb789f0c8f0f1badad8a92f6101053f0a44f73785409ae02a40a93fdf5f39637e974958c57a3

    • C:\Windows\SysWOW64\Dodbbdbb.exe

      Filesize

      73KB

      MD5

      18f554fb70b1e65249302741ced9d081

      SHA1

      fa9611d52323e0a6b78ed9cee7de511d3a6dfb63

      SHA256

      8065ca87e75b9e7e53d5f13f90ba6ccb77fa717c9567cd4d53300d241f9beddf

      SHA512

      1c3410695fff8380cc985c43b6918d79eb2baf59d290dcdaa38785472e8a490562ef2e67cfaabf4cf752c848c931dacbd4d70b874673bb30b315dec432993cd4

    • C:\Windows\SysWOW64\Dodbbdbb.exe

      Filesize

      73KB

      MD5

      18f554fb70b1e65249302741ced9d081

      SHA1

      fa9611d52323e0a6b78ed9cee7de511d3a6dfb63

      SHA256

      8065ca87e75b9e7e53d5f13f90ba6ccb77fa717c9567cd4d53300d241f9beddf

      SHA512

      1c3410695fff8380cc985c43b6918d79eb2baf59d290dcdaa38785472e8a490562ef2e67cfaabf4cf752c848c931dacbd4d70b874673bb30b315dec432993cd4

    • C:\Windows\SysWOW64\Dogogcpo.exe

      Filesize

      73KB

      MD5

      63207b0fa94e177f4fd7034cfd3d6220

      SHA1

      19c78794316c4f8c61eb735dc3c52ea3bd904b81

      SHA256

      1ec40a4bf4285554c084d1d892aa6e19162d732ca81cb2076296fc4cc874a5e9

      SHA512

      8a661ddc934bda0b732c2b4afbfe76911393027c8d512b08b464a2960590dbf36799e2d198b403c87917fb75a29250d4eca1d469f7a8395c2e98e2555eec6b7e

    • C:\Windows\SysWOW64\Dogogcpo.exe

      Filesize

      73KB

      MD5

      63207b0fa94e177f4fd7034cfd3d6220

      SHA1

      19c78794316c4f8c61eb735dc3c52ea3bd904b81

      SHA256

      1ec40a4bf4285554c084d1d892aa6e19162d732ca81cb2076296fc4cc874a5e9

      SHA512

      8a661ddc934bda0b732c2b4afbfe76911393027c8d512b08b464a2960590dbf36799e2d198b403c87917fb75a29250d4eca1d469f7a8395c2e98e2555eec6b7e

    • memory/224-16-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/224-73-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1708-1-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1708-0-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1708-66-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2028-68-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2028-56-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2184-65-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2184-67-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3836-32-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3836-71-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4256-74-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4256-8-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4304-40-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4304-70-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4400-72-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4400-24-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4872-48-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4872-69-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB