Analysis
-
max time kernel
120s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 16:30
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.07d6133a5d84a193aa6a9e52d5df2dd0_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.07d6133a5d84a193aa6a9e52d5df2dd0_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.07d6133a5d84a193aa6a9e52d5df2dd0_JC.exe
-
Size
208KB
-
MD5
07d6133a5d84a193aa6a9e52d5df2dd0
-
SHA1
868e24eeb56cb7e5ceb4a2313d89ba838137ce21
-
SHA256
2ca6071240b2678eb38df1e18424090a804750af4589c8c4ea308ec2497b9e47
-
SHA512
0eea9dd30af01d349a667cffb31c84b177efe44e675a7695f774584c32fa8f7630718b95871482475d058b1f47f94919330993f0b3c5de8191c558debf4af763
-
SSDEEP
6144:Kpk9w9HF/IUWfw18m4jOXl9a07QDykQEj1:5wnn/TaYPkQC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2720 GQC.exe -
Loads dropped DLL 2 IoCs
pid Process 2732 cmd.exe 2732 cmd.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\windows\SysWOW64\GQC.exe NEAS.07d6133a5d84a193aa6a9e52d5df2dd0_JC.exe File opened for modification C:\windows\SysWOW64\GQC.exe NEAS.07d6133a5d84a193aa6a9e52d5df2dd0_JC.exe File created C:\windows\SysWOW64\GQC.exe.bat NEAS.07d6133a5d84a193aa6a9e52d5df2dd0_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 856 NEAS.07d6133a5d84a193aa6a9e52d5df2dd0_JC.exe 2720 GQC.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 856 NEAS.07d6133a5d84a193aa6a9e52d5df2dd0_JC.exe 856 NEAS.07d6133a5d84a193aa6a9e52d5df2dd0_JC.exe 2720 GQC.exe 2720 GQC.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 856 wrote to memory of 2732 856 NEAS.07d6133a5d84a193aa6a9e52d5df2dd0_JC.exe 28 PID 856 wrote to memory of 2732 856 NEAS.07d6133a5d84a193aa6a9e52d5df2dd0_JC.exe 28 PID 856 wrote to memory of 2732 856 NEAS.07d6133a5d84a193aa6a9e52d5df2dd0_JC.exe 28 PID 856 wrote to memory of 2732 856 NEAS.07d6133a5d84a193aa6a9e52d5df2dd0_JC.exe 28 PID 2732 wrote to memory of 2720 2732 cmd.exe 30 PID 2732 wrote to memory of 2720 2732 cmd.exe 30 PID 2732 wrote to memory of 2720 2732 cmd.exe 30 PID 2732 wrote to memory of 2720 2732 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.07d6133a5d84a193aa6a9e52d5df2dd0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.07d6133a5d84a193aa6a9e52d5df2dd0_JC.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\system32\GQC.exe.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\windows\SysWOW64\GQC.exeC:\windows\system32\GQC.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD5475c07037e2d798ec9c634db1ea5dcc3
SHA1291448236451e8415508dc262fffef7010cc5847
SHA256d08fe398a308c1df657aefd87b3ab1afd76fee06748d176d0c910d187a43d2f4
SHA51217dc4110846e2433087c5c0d568cf80e0983b06ec431ac15b2a5733e2f7cbf44ecd2ce96611d4d4b82ecf5f66a54bd6b6be0c395b3b00b2b7d60bdfd830489b1
-
Filesize
70B
MD5a0d949bcde85681209a199940da1e381
SHA1141365f91386aa260562bf76cefcf3dc0a83befd
SHA25609cddd12226a17e56cecc37f877f351ffc71f965bc082908c169d20be36ff166
SHA5127b0dad2f82eb7dfe8174c129d83f2169bb6679e3ce69e19cf35a06327a739af7d2837bd71d503343529b1517a24a34b841de00c8714f6bd602c2b381e74703c4
-
Filesize
208KB
MD5475c07037e2d798ec9c634db1ea5dcc3
SHA1291448236451e8415508dc262fffef7010cc5847
SHA256d08fe398a308c1df657aefd87b3ab1afd76fee06748d176d0c910d187a43d2f4
SHA51217dc4110846e2433087c5c0d568cf80e0983b06ec431ac15b2a5733e2f7cbf44ecd2ce96611d4d4b82ecf5f66a54bd6b6be0c395b3b00b2b7d60bdfd830489b1
-
Filesize
70B
MD5a0d949bcde85681209a199940da1e381
SHA1141365f91386aa260562bf76cefcf3dc0a83befd
SHA25609cddd12226a17e56cecc37f877f351ffc71f965bc082908c169d20be36ff166
SHA5127b0dad2f82eb7dfe8174c129d83f2169bb6679e3ce69e19cf35a06327a739af7d2837bd71d503343529b1517a24a34b841de00c8714f6bd602c2b381e74703c4
-
Filesize
208KB
MD5475c07037e2d798ec9c634db1ea5dcc3
SHA1291448236451e8415508dc262fffef7010cc5847
SHA256d08fe398a308c1df657aefd87b3ab1afd76fee06748d176d0c910d187a43d2f4
SHA51217dc4110846e2433087c5c0d568cf80e0983b06ec431ac15b2a5733e2f7cbf44ecd2ce96611d4d4b82ecf5f66a54bd6b6be0c395b3b00b2b7d60bdfd830489b1
-
Filesize
208KB
MD5475c07037e2d798ec9c634db1ea5dcc3
SHA1291448236451e8415508dc262fffef7010cc5847
SHA256d08fe398a308c1df657aefd87b3ab1afd76fee06748d176d0c910d187a43d2f4
SHA51217dc4110846e2433087c5c0d568cf80e0983b06ec431ac15b2a5733e2f7cbf44ecd2ce96611d4d4b82ecf5f66a54bd6b6be0c395b3b00b2b7d60bdfd830489b1