Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 18:34
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe
-
Size
135KB
-
MD5
272996c13790ce23f5a06662dc3c5280
-
SHA1
e71f00f99de8042a914ffaa9c4a9c87122f83e05
-
SHA256
dd4ce57ed4b1f3e23e7a618534e7e47137e21f7afb1c10f368b4258994f65ff7
-
SHA512
3dda42c6b7fbcf714eb605659d9720b11426aba8072a4b517082cf184f2d886db427e2de8a678b0f8fe55f947b779ff55d1aac769b7c18a02f92e6da86938523
-
SSDEEP
1536:XfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbg+3:XVqoCl/YgjxEufVU0TbTyDDalR3
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4372 explorer.exe 3652 spoolsv.exe 1908 svchost.exe 1424 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe 4372 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4372 explorer.exe 1908 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 4372 explorer.exe 4372 explorer.exe 3652 spoolsv.exe 3652 spoolsv.exe 1908 svchost.exe 1908 svchost.exe 1424 spoolsv.exe 1424 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4476 wrote to memory of 4372 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 86 PID 4476 wrote to memory of 4372 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 86 PID 4476 wrote to memory of 4372 4476 NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe 86 PID 4372 wrote to memory of 3652 4372 explorer.exe 89 PID 4372 wrote to memory of 3652 4372 explorer.exe 89 PID 4372 wrote to memory of 3652 4372 explorer.exe 89 PID 3652 wrote to memory of 1908 3652 spoolsv.exe 91 PID 3652 wrote to memory of 1908 3652 spoolsv.exe 91 PID 3652 wrote to memory of 1908 3652 spoolsv.exe 91 PID 1908 wrote to memory of 1424 1908 svchost.exe 92 PID 1908 wrote to memory of 1424 1908 svchost.exe 92 PID 1908 wrote to memory of 1424 1908 svchost.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.272996c13790ce23f5a06662dc3c5280_JC.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4476 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4372 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3652 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1424
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD505df9c58c91a52b229f17d0a36902716
SHA158dcc8afa277630be7b5c9b02512794cccd6984e
SHA256fb306424ffd96914671ca4f3efbb4a4acb0a276206d067994bd042b368bc7e07
SHA5121a9e6841a6d0871c995bb60d8c0f8a7a08f18b7a8260ce43afdc1c01a371b861bc9c110f0400f09d20eab74a2de38bfa97d8d76d608c8a948a726483663be367
-
Filesize
135KB
MD50b0460ebc66c22c590d71025f46e1517
SHA19e9dcfc82555c17b975058d78fe8c90cf30a7782
SHA256fafbcea0a72f91b60ea279d2266dc195f2941443a1fa8ce39bbed2c81d9bef0b
SHA51252633b174bfc6cb7a27e081a6e0b2e037ded66ed6c88c4594c63b6b5866d9ac82f391ff176616518f943587886cab816f82716cbf81c393fe2e923d50eb91e82
-
Filesize
135KB
MD50b0460ebc66c22c590d71025f46e1517
SHA19e9dcfc82555c17b975058d78fe8c90cf30a7782
SHA256fafbcea0a72f91b60ea279d2266dc195f2941443a1fa8ce39bbed2c81d9bef0b
SHA51252633b174bfc6cb7a27e081a6e0b2e037ded66ed6c88c4594c63b6b5866d9ac82f391ff176616518f943587886cab816f82716cbf81c393fe2e923d50eb91e82
-
Filesize
135KB
MD50b0460ebc66c22c590d71025f46e1517
SHA19e9dcfc82555c17b975058d78fe8c90cf30a7782
SHA256fafbcea0a72f91b60ea279d2266dc195f2941443a1fa8ce39bbed2c81d9bef0b
SHA51252633b174bfc6cb7a27e081a6e0b2e037ded66ed6c88c4594c63b6b5866d9ac82f391ff176616518f943587886cab816f82716cbf81c393fe2e923d50eb91e82
-
Filesize
135KB
MD582218d8c5c1c18f3095f0646ff5bdc98
SHA1f9d354195b9a1bb3292e41a1711b4cdd08e8cda1
SHA2568e07465fc35cb513f2638e31765982a3974f135832b211a8d5cecf58e5a99ca6
SHA512efb1860ec1a4feecb386e3255fc2a2765ea90aa7de79572dafd225a457e8caac8fc389ddd8887aa9c74fbbf9e1f759020db9ea464c49f187ffb2a31a89bdf46d
-
Filesize
135KB
MD50b0460ebc66c22c590d71025f46e1517
SHA19e9dcfc82555c17b975058d78fe8c90cf30a7782
SHA256fafbcea0a72f91b60ea279d2266dc195f2941443a1fa8ce39bbed2c81d9bef0b
SHA51252633b174bfc6cb7a27e081a6e0b2e037ded66ed6c88c4594c63b6b5866d9ac82f391ff176616518f943587886cab816f82716cbf81c393fe2e923d50eb91e82
-
Filesize
135KB
MD582218d8c5c1c18f3095f0646ff5bdc98
SHA1f9d354195b9a1bb3292e41a1711b4cdd08e8cda1
SHA2568e07465fc35cb513f2638e31765982a3974f135832b211a8d5cecf58e5a99ca6
SHA512efb1860ec1a4feecb386e3255fc2a2765ea90aa7de79572dafd225a457e8caac8fc389ddd8887aa9c74fbbf9e1f759020db9ea464c49f187ffb2a31a89bdf46d
-
Filesize
135KB
MD505df9c58c91a52b229f17d0a36902716
SHA158dcc8afa277630be7b5c9b02512794cccd6984e
SHA256fb306424ffd96914671ca4f3efbb4a4acb0a276206d067994bd042b368bc7e07
SHA5121a9e6841a6d0871c995bb60d8c0f8a7a08f18b7a8260ce43afdc1c01a371b861bc9c110f0400f09d20eab74a2de38bfa97d8d76d608c8a948a726483663be367