Analysis

  • max time kernel
    140s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 16:09

General

  • Target

    NEAS.06425f46e40612bb3288749a3ce5e620_JC.exe

  • Size

    235KB

  • MD5

    06425f46e40612bb3288749a3ce5e620

  • SHA1

    c5d1dc1a83903dd9710395ebef6f8c3ce9891723

  • SHA256

    12fe2786c3d25b883a92f6095a750226ea089141fe5bf4c4bff5a5f80f729934

  • SHA512

    e5215d97965783ffc1fe76b0548010f7acd5d48047139e7a520411e584b9ee088e480c7c6bd05fbab2ac9be1b5ebb240d2e3adbab448538c02bba47e2ea44f6d

  • SSDEEP

    6144:vXXvkVSx/tC4FxAD5REihwOPwNVicDjo7jTkacZZqQWug:fptwD4ib4VDcrka9D

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.06425f46e40612bb3288749a3ce5e620_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.06425f46e40612bb3288749a3ce5e620_JC.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3508
    • C:\Users\Admin\AppData\Local\Temp\PU0szVivfsM2Myi.exe
      C:\Users\Admin\AppData\Local\Temp\PU0szVivfsM2Myi.exe
      2⤵
      • Executes dropped EXE
      PID:4408
    • C:\Windows\spoolsv.exe
      "C:\Windows\spoolsv.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      PID:4524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    347KB

    MD5

    8a95b38789175ceaacbefb596f72f292

    SHA1

    eff2371a9947ed27cbe927cba9d6c8ed2b9bb03d

    SHA256

    69024cae40b840d1dfe88db68f9c7a2b23fb6409da73797933eb1f40154e093b

    SHA512

    c2935fe8e0c572c08f3f58ae342f30ae967fc51229c285caf8bbd70f67d89b84124b9b372cbf3ecff016cf0bd9b6ccaed3c4da2a19ee2765bb17cd06126fdd92

  • C:\Users\Admin\AppData\Local\Temp\PU0szVivfsM2Myi.exe

    Filesize

    210KB

    MD5

    541cba6b4cd1f65d7c0305223c24cb00

    SHA1

    0e54791ae9cbb34a2f7299e09dc17033a2a60475

    SHA256

    0321c2ee69b9c6f7a5a310d501d935579d7e9a7c63f43185409a19b299edd376

    SHA512

    119dcd15a68908a4a6a0d537fdcfb4ace2ab5a39639cf48539242cf195413ba9c0eec6ec9bb14103cac797ba259acf27614815168c3f118a6dd38ff22812a74c

  • C:\Users\Admin\AppData\Local\Temp\PU0szVivfsM2Myi.exe

    Filesize

    210KB

    MD5

    541cba6b4cd1f65d7c0305223c24cb00

    SHA1

    0e54791ae9cbb34a2f7299e09dc17033a2a60475

    SHA256

    0321c2ee69b9c6f7a5a310d501d935579d7e9a7c63f43185409a19b299edd376

    SHA512

    119dcd15a68908a4a6a0d537fdcfb4ace2ab5a39639cf48539242cf195413ba9c0eec6ec9bb14103cac797ba259acf27614815168c3f118a6dd38ff22812a74c

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb