Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 18:39
Behavioral task
behavioral1
Sample
NEAS.0f15768c9eae8db469d4d2247dc4e490_JC.dll
Resource
win7-20230831-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.0f15768c9eae8db469d4d2247dc4e490_JC.dll
Resource
win10v2004-20230915-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
NEAS.0f15768c9eae8db469d4d2247dc4e490_JC.dll
-
Size
76KB
-
MD5
0f15768c9eae8db469d4d2247dc4e490
-
SHA1
a4863d493dcd714ce561eaa675f9071ecb048a9c
-
SHA256
bdb13f03918cd89b53e77c5c4722c2c2f514919f8dd0324a773bcc3ab332c1b2
-
SHA512
afb06521ad72234dcf54b9190b6a0db2aaa474ff647f7afe4d982f145449ac66e6c8904d2df14a1a5007a6428d94881524dfd37ad6c44ae0b2044c67226fe535
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7Z2KkvjT:c8y93KQjy7G55riF1cMo03sKkvH
Score
8/10
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
resource yara_rule behavioral1/memory/2964-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2964-2-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2964-1-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2964-3-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2016 2964 WerFault.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2964 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2964 2088 rundll32.exe 28 PID 2088 wrote to memory of 2964 2088 rundll32.exe 28 PID 2088 wrote to memory of 2964 2088 rundll32.exe 28 PID 2088 wrote to memory of 2964 2088 rundll32.exe 28 PID 2088 wrote to memory of 2964 2088 rundll32.exe 28 PID 2088 wrote to memory of 2964 2088 rundll32.exe 28 PID 2088 wrote to memory of 2964 2088 rundll32.exe 28 PID 2964 wrote to memory of 2016 2964 rundll32.exe 29 PID 2964 wrote to memory of 2016 2964 rundll32.exe 29 PID 2964 wrote to memory of 2016 2964 rundll32.exe 29 PID 2964 wrote to memory of 2016 2964 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.0f15768c9eae8db469d4d2247dc4e490_JC.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.0f15768c9eae8db469d4d2247dc4e490_JC.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 2643⤵
- Program crash
PID:2016
-
-