Analysis
-
max time kernel
151s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-10-2023 14:55
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.00d06d3084f98004ffde27ce27b83120_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.00d06d3084f98004ffde27ce27b83120_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.00d06d3084f98004ffde27ce27b83120_JC.exe
-
Size
314KB
-
MD5
00d06d3084f98004ffde27ce27b83120
-
SHA1
61d9069da404a2f3c255840194cb9d91a21c81d5
-
SHA256
c7144c215a3a8802192cd00ae6e6e7dec78dd13c54df38b9b6e38df159e6d663
-
SHA512
6e813137168bef1cc3e7348b80fb8251eb83adc91e26774ed2fbea46819407c600e9938bc27132ce0059d32d8b4a958f2b70aa2a6fef32b093cf8ce0a384f6eb
-
SSDEEP
6144:jZCL8gVigTM7XdJ/Euz3EpKDhrmlZRCRLiIEufbL6ZOvMBlv8bXUQ:jZCL8+ipdlNz3EKSeRLtpfbjvMr8bXd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1308 6E0F.tmp -
Loads dropped DLL 2 IoCs
pid Process 2888 NEAS.00d06d3084f98004ffde27ce27b83120_JC.exe 2888 NEAS.00d06d3084f98004ffde27ce27b83120_JC.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\cryptocme2.dll 6E0F.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\rt3d.dll 6E0F.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Search.api 6E0F.tmp File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdaterInstallMgr.exe 6E0F.tmp File opened for modification C:\Program Files (x86)\Common Files\System\MSMAPI\1033\MSMAPI32.DLL 6E0F.tmp File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AXSLE.dll 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\RM.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\authplay.dll 6E0F.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\nppdf32.dll 6E0F.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Filters\odffilt.dll 6E0F.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FREN\MSB1FREN.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EMABLT32.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\FPSRVUTL.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EMSMDB32.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1036\MSGR3FR.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OLKFSTUB.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\THOCRAPI.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSSP7EN.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\Synchronization.dll 6E0F.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\sqlite.dll 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEEX.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MCPS.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\TRANSMGR.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\AiodLite.dll 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCDDSF.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MAPIPH.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOCFU.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OISGRAPH.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OMSMAIN.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\drvDX9.x3d 6E0F.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\MSB1STAR.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONTAB32.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBCONV.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSTH7EN.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\GIFIMP32.FLT 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSAEXP30.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSODCW.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONFILTER.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VISSHE.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1033\MSGR3EN.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeXMP.dll 6E0F.tmp File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSHY7ES.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Portal\PortalConnectCore.dll 6E0F.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\AUMProduct.aup 6E0F.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\EScript.api 6E0F.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\weblink.api 6E0F.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACERCLR.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACETXT.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLMF.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\VBAJET32.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\msmgdsrv.dll 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPST32.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OFFXML.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OWSSUPP.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADDINS\ColleagueImport.dll 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\ORG97.SAM 6E0F.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Accessibility.api 6E0F.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACEEXCH.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\msolui100.dll 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOCF.DLL 6E0F.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE 6E0F.tmp -
Drops file in Windows directory 15 IoCs
description ioc Process File created C:\Windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\system_data_dll_x86 6E0F.tmp File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.VisualBasic.Activities.Compiler\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.Activities.Compiler.dll 6E0F.tmp File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll 6E0F.tmp File created C:\Windows\assembly\GAC_32\PresentationCore\3.0.0.0__31bf3856ad364e35\wpfgfx_v0300.dll 6E0F.tmp File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0000000010\9.0.0\ul_msvcr80.dll.98CB24AD_52FB_DB5F_FF1F_C8B3B9A1E18E 6E0F.tmp File created C:\Windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\system_data_dll_gac_x86 6E0F.tmp File created C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_msvcr100_x86 6E0F.tmp File created C:\Windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\wpfgfx_x86.dll 6E0F.tmp File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data.OracleClient\v4.0_4.0.0.0__b77a5c561934e089\System.Data.OracleClient.dll 6E0F.tmp File created C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_mfc100u_x86 6E0F.tmp File created C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_mfc100_x86 6E0F.tmp File created C:\Windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\PresentationHostDLL_X86.dll 6E0F.tmp File created C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll 6E0F.tmp File created C:\Windows\assembly\GAC_32\System.Data.OracleClient\2.0.0.0__b77a5c561934e089\System.Data.OracleClient.dll 6E0F.tmp File created C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_atl100_x86 6E0F.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 1308 2888 NEAS.00d06d3084f98004ffde27ce27b83120_JC.exe 18 PID 2888 wrote to memory of 1308 2888 NEAS.00d06d3084f98004ffde27ce27b83120_JC.exe 18 PID 2888 wrote to memory of 1308 2888 NEAS.00d06d3084f98004ffde27ce27b83120_JC.exe 18 PID 2888 wrote to memory of 1308 2888 NEAS.00d06d3084f98004ffde27ce27b83120_JC.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.00d06d3084f98004ffde27ce27b83120_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.00d06d3084f98004ffde27ce27b83120_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\6E0F.tmpC:\Users\Admin\AppData\Local\Temp\6E0F.tmp2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
PID:1308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666