Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 16:22
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.08ab344f2d838bba1cf532c7d82cab10_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.08ab344f2d838bba1cf532c7d82cab10_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.08ab344f2d838bba1cf532c7d82cab10_JC.exe
-
Size
427KB
-
MD5
08ab344f2d838bba1cf532c7d82cab10
-
SHA1
be755d647b9be29c02926ad2bc69b50f3ca3aa02
-
SHA256
7989a7b69de838951253bcbd26ce463584354379a3dc07bb935d0fba8622a709
-
SHA512
2f69e10336163841655c7f3f7a27770a907cb8e4e6fd698b3d9e4cc644a6a67279b14b416cd69d4b8df427e5f6fe56bdff4bbaf54c89b122f395f644a1e1fc53
-
SSDEEP
3072:VChJgYMm4xf9cU9KQ2BxA59SPMvOogn2D0YK0FN8lpSUyKncAxi2n:BYMm4xiWKQ2BiCMFZK03kNcATn
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2580 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 1456 NEAS.08ab344f2d838bba1cf532c7d82cab10_JC.exe 1456 NEAS.08ab344f2d838bba1cf532c7d82cab10_JC.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\4fc8fee6\4fc8fee6 NEAS.08ab344f2d838bba1cf532c7d82cab10_JC.exe File created C:\Program Files (x86)\4fc8fee6\jusched.exe NEAS.08ab344f2d838bba1cf532c7d82cab10_JC.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job NEAS.08ab344f2d838bba1cf532c7d82cab10_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1456 wrote to memory of 2580 1456 NEAS.08ab344f2d838bba1cf532c7d82cab10_JC.exe 30 PID 1456 wrote to memory of 2580 1456 NEAS.08ab344f2d838bba1cf532c7d82cab10_JC.exe 30 PID 1456 wrote to memory of 2580 1456 NEAS.08ab344f2d838bba1cf532c7d82cab10_JC.exe 30 PID 1456 wrote to memory of 2580 1456 NEAS.08ab344f2d838bba1cf532c7d82cab10_JC.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.08ab344f2d838bba1cf532c7d82cab10_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.08ab344f2d838bba1cf532c7d82cab10_JC.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Program Files (x86)\4fc8fee6\jusched.exe"C:\Program Files (x86)\4fc8fee6\jusched.exe"2⤵
- Executes dropped EXE
PID:2580
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD589931a70501a3362b6823b53523f5a77
SHA188c7e199c462ed8cc3af0ba453512b5b1fdcfdb5
SHA256d30d9a0e64bc9f4a306617f087f30de6d57a5413793ab7bde13a299777a1b254
SHA5128fa7ab4824ae86f3f47b3718c11f79ef275dd0639396572eaeb1262ad9153ccf43c633a7b292e30c97370436a09f22fbcf817a802015650ffb1f84d2b83483bd
-
Filesize
427KB
MD5d14da25d4aa724514bc872b0d268aa3d
SHA1d0f8599b3d609fdeef40eede986c04e0d30253cb
SHA25630226fb7b0fdb463b1b4d53f31b4f445150744c402b60af26688c08f891fe876
SHA512008192d56772b84b54a5052c4a6138f58c56de0defa5911617f6297ec08712a61ca5ec211f17d81695692d17b320821bb2bc031d50d5a1ba7b19ac741fa5d62c
-
Filesize
427KB
MD5d14da25d4aa724514bc872b0d268aa3d
SHA1d0f8599b3d609fdeef40eede986c04e0d30253cb
SHA25630226fb7b0fdb463b1b4d53f31b4f445150744c402b60af26688c08f891fe876
SHA512008192d56772b84b54a5052c4a6138f58c56de0defa5911617f6297ec08712a61ca5ec211f17d81695692d17b320821bb2bc031d50d5a1ba7b19ac741fa5d62c
-
Filesize
427KB
MD5d14da25d4aa724514bc872b0d268aa3d
SHA1d0f8599b3d609fdeef40eede986c04e0d30253cb
SHA25630226fb7b0fdb463b1b4d53f31b4f445150744c402b60af26688c08f891fe876
SHA512008192d56772b84b54a5052c4a6138f58c56de0defa5911617f6297ec08712a61ca5ec211f17d81695692d17b320821bb2bc031d50d5a1ba7b19ac741fa5d62c
-
Filesize
427KB
MD5d14da25d4aa724514bc872b0d268aa3d
SHA1d0f8599b3d609fdeef40eede986c04e0d30253cb
SHA25630226fb7b0fdb463b1b4d53f31b4f445150744c402b60af26688c08f891fe876
SHA512008192d56772b84b54a5052c4a6138f58c56de0defa5911617f6297ec08712a61ca5ec211f17d81695692d17b320821bb2bc031d50d5a1ba7b19ac741fa5d62c