Analysis

  • max time kernel
    71s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 17:32

General

  • Target

    NEAS.0b11164ff569bf53cc636f800a89cad0_JC.exe

  • Size

    88KB

  • MD5

    0b11164ff569bf53cc636f800a89cad0

  • SHA1

    f9de2da5c9014e35614bf811f8020507ed200d08

  • SHA256

    97383da14773c9b166287c9daac326ecf9d7e6365537fb27318ba2f9875b7232

  • SHA512

    b18503624fad071d9ceca2339c3ae99fc468c9ff644670c96ca9c8243e17c392998c69a5805b0099dacedc2334317dc6bb6796a2d06c42833d8666883c6053a8

  • SSDEEP

    1536:5lrsicagdzn8K2ariPOcjk+XQuPVN72NMShfc3HrPNax0rgavQO:5JjcF8KfCOcjk+guPVjS+1/TP

Score
7/10

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.0b11164ff569bf53cc636f800a89cad0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.0b11164ff569bf53cc636f800a89cad0_JC.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    PID:2284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\macromd\Yahoo mail cracker.exe

    Filesize

    75KB

    MD5

    151b0bc82902883108b0300398e5fdf5

    SHA1

    0ac794912d135fd1b116cb0b7ad7a6220cfc6885

    SHA256

    f883d470e3ac8757c1f61b21579b6a6c9534d479c0c40e8f454c97346338bfd9

    SHA512

    ca148a596189dbf26bf1634279935ced8d64e254b4cf05a7d9fb34a5a9a23c0c0e7d6121ea3a2e6ca5a2e1c9258cfec198073159e265505d1530f7aa0f3fff5b

  • memory/2284-3-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2284-16-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2284-35-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB