Analysis

  • max time kernel
    152s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 18:34

General

  • Target

    NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe

  • Size

    135KB

  • MD5

    272996c13790ce23f5a06662dc3c5280

  • SHA1

    e71f00f99de8042a914ffaa9c4a9c87122f83e05

  • SHA256

    dd4ce57ed4b1f3e23e7a618534e7e47137e21f7afb1c10f368b4258994f65ff7

  • SHA512

    3dda42c6b7fbcf714eb605659d9720b11426aba8072a4b517082cf184f2d886db427e2de8a678b0f8fe55f947b779ff55d1aac769b7c18a02f92e6da86938523

  • SSDEEP

    1536:XfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbg+3:XVqoCl/YgjxEufVU0TbTyDDalR3

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4476
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4372
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3652
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1908
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1424

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\Resources\Themes\explorer.exe

          Filesize

          135KB

          MD5

          05df9c58c91a52b229f17d0a36902716

          SHA1

          58dcc8afa277630be7b5c9b02512794cccd6984e

          SHA256

          fb306424ffd96914671ca4f3efbb4a4acb0a276206d067994bd042b368bc7e07

          SHA512

          1a9e6841a6d0871c995bb60d8c0f8a7a08f18b7a8260ce43afdc1c01a371b861bc9c110f0400f09d20eab74a2de38bfa97d8d76d608c8a948a726483663be367

        • C:\Windows\Resources\spoolsv.exe

          Filesize

          135KB

          MD5

          0b0460ebc66c22c590d71025f46e1517

          SHA1

          9e9dcfc82555c17b975058d78fe8c90cf30a7782

          SHA256

          fafbcea0a72f91b60ea279d2266dc195f2941443a1fa8ce39bbed2c81d9bef0b

          SHA512

          52633b174bfc6cb7a27e081a6e0b2e037ded66ed6c88c4594c63b6b5866d9ac82f391ff176616518f943587886cab816f82716cbf81c393fe2e923d50eb91e82

        • C:\Windows\Resources\spoolsv.exe

          Filesize

          135KB

          MD5

          0b0460ebc66c22c590d71025f46e1517

          SHA1

          9e9dcfc82555c17b975058d78fe8c90cf30a7782

          SHA256

          fafbcea0a72f91b60ea279d2266dc195f2941443a1fa8ce39bbed2c81d9bef0b

          SHA512

          52633b174bfc6cb7a27e081a6e0b2e037ded66ed6c88c4594c63b6b5866d9ac82f391ff176616518f943587886cab816f82716cbf81c393fe2e923d50eb91e82

        • C:\Windows\Resources\spoolsv.exe

          Filesize

          135KB

          MD5

          0b0460ebc66c22c590d71025f46e1517

          SHA1

          9e9dcfc82555c17b975058d78fe8c90cf30a7782

          SHA256

          fafbcea0a72f91b60ea279d2266dc195f2941443a1fa8ce39bbed2c81d9bef0b

          SHA512

          52633b174bfc6cb7a27e081a6e0b2e037ded66ed6c88c4594c63b6b5866d9ac82f391ff176616518f943587886cab816f82716cbf81c393fe2e923d50eb91e82

        • C:\Windows\Resources\svchost.exe

          Filesize

          135KB

          MD5

          82218d8c5c1c18f3095f0646ff5bdc98

          SHA1

          f9d354195b9a1bb3292e41a1711b4cdd08e8cda1

          SHA256

          8e07465fc35cb513f2638e31765982a3974f135832b211a8d5cecf58e5a99ca6

          SHA512

          efb1860ec1a4feecb386e3255fc2a2765ea90aa7de79572dafd225a457e8caac8fc389ddd8887aa9c74fbbf9e1f759020db9ea464c49f187ffb2a31a89bdf46d

        • \??\c:\windows\resources\spoolsv.exe

          Filesize

          135KB

          MD5

          0b0460ebc66c22c590d71025f46e1517

          SHA1

          9e9dcfc82555c17b975058d78fe8c90cf30a7782

          SHA256

          fafbcea0a72f91b60ea279d2266dc195f2941443a1fa8ce39bbed2c81d9bef0b

          SHA512

          52633b174bfc6cb7a27e081a6e0b2e037ded66ed6c88c4594c63b6b5866d9ac82f391ff176616518f943587886cab816f82716cbf81c393fe2e923d50eb91e82

        • \??\c:\windows\resources\svchost.exe

          Filesize

          135KB

          MD5

          82218d8c5c1c18f3095f0646ff5bdc98

          SHA1

          f9d354195b9a1bb3292e41a1711b4cdd08e8cda1

          SHA256

          8e07465fc35cb513f2638e31765982a3974f135832b211a8d5cecf58e5a99ca6

          SHA512

          efb1860ec1a4feecb386e3255fc2a2765ea90aa7de79572dafd225a457e8caac8fc389ddd8887aa9c74fbbf9e1f759020db9ea464c49f187ffb2a31a89bdf46d

        • \??\c:\windows\resources\themes\explorer.exe

          Filesize

          135KB

          MD5

          05df9c58c91a52b229f17d0a36902716

          SHA1

          58dcc8afa277630be7b5c9b02512794cccd6984e

          SHA256

          fb306424ffd96914671ca4f3efbb4a4acb0a276206d067994bd042b368bc7e07

          SHA512

          1a9e6841a6d0871c995bb60d8c0f8a7a08f18b7a8260ce43afdc1c01a371b861bc9c110f0400f09d20eab74a2de38bfa97d8d76d608c8a948a726483663be367

        • memory/1424-34-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/1908-37-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/3652-35-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/4372-36-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/4476-19-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/4476-0-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB