Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2023, 17:34

General

  • Target

    NEAS.0bbbc5e47937e28aecce4004803806b0_JC.exe

  • Size

    208KB

  • MD5

    0bbbc5e47937e28aecce4004803806b0

  • SHA1

    e96287b7731a41d7c723677247c402f5d82620eb

  • SHA256

    5fa2b362de42586f08af6fb4445a58868601845840ac4064475dc353b84c2665

  • SHA512

    d79c7bb89aa6ab22fc07834fc780fed504c669e35a0bcb8abb62050f0cbcf828016bc383d573485c00005239d3895860fa522abdd928315f9e62818d4a0d33ad

  • SSDEEP

    3072:Hhemx1BYz3aXICXibLJ8W/viu5Mt1/pisTMyFocq4NLthEjQT6j:HAeBYz3aXICXsGA3mj/pisPqQEj1

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.0bbbc5e47937e28aecce4004803806b0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.0bbbc5e47937e28aecce4004803806b0_JC.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\windows\system32\JTBF.exe.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1080
      • C:\windows\SysWOW64\JTBF.exe
        C:\windows\system32\JTBF.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\JTBF.exe

    Filesize

    208KB

    MD5

    381d0033f66d58afc734a110723a58ca

    SHA1

    7a5483371ecee9a0462d83f7f727a710a64bb021

    SHA256

    70a6f696a64cbb8d3cc5607e3921deebf4cc14dedc12ba6a1f6901d4f71dc552

    SHA512

    54fb32553cc66995e0fbe7714835d3e6479e71c0272d3b04cb9ce855b4787c3556e1640a8095ec04408caf4660d4eb548fdfd9ad69ed00a1fe66fce3f041a800

  • C:\Windows\SysWOW64\JTBF.exe.bat

    Filesize

    72B

    MD5

    dba8544594dc970b2d87a0c6e0736637

    SHA1

    0227b9b3fcc4de93d9ee16a56bd3e3778c2bf747

    SHA256

    6161ab91f5bc830092324b5803fb9c759843a8931fb918c6b70ba55fdf882fea

    SHA512

    f19a268c3de4b1b74a14f88629399e63a47e9a5a84c3ec9cc18b6a8dc237edd17e040750ba3afb8037134245c67b06d86cf9c25a6eab1b92cebf90c58f7956e3

  • C:\windows\SysWOW64\JTBF.exe

    Filesize

    208KB

    MD5

    381d0033f66d58afc734a110723a58ca

    SHA1

    7a5483371ecee9a0462d83f7f727a710a64bb021

    SHA256

    70a6f696a64cbb8d3cc5607e3921deebf4cc14dedc12ba6a1f6901d4f71dc552

    SHA512

    54fb32553cc66995e0fbe7714835d3e6479e71c0272d3b04cb9ce855b4787c3556e1640a8095ec04408caf4660d4eb548fdfd9ad69ed00a1fe66fce3f041a800

  • C:\windows\SysWOW64\JTBF.exe.bat

    Filesize

    72B

    MD5

    dba8544594dc970b2d87a0c6e0736637

    SHA1

    0227b9b3fcc4de93d9ee16a56bd3e3778c2bf747

    SHA256

    6161ab91f5bc830092324b5803fb9c759843a8931fb918c6b70ba55fdf882fea

    SHA512

    f19a268c3de4b1b74a14f88629399e63a47e9a5a84c3ec9cc18b6a8dc237edd17e040750ba3afb8037134245c67b06d86cf9c25a6eab1b92cebf90c58f7956e3

  • \Windows\SysWOW64\JTBF.exe

    Filesize

    208KB

    MD5

    381d0033f66d58afc734a110723a58ca

    SHA1

    7a5483371ecee9a0462d83f7f727a710a64bb021

    SHA256

    70a6f696a64cbb8d3cc5607e3921deebf4cc14dedc12ba6a1f6901d4f71dc552

    SHA512

    54fb32553cc66995e0fbe7714835d3e6479e71c0272d3b04cb9ce855b4787c3556e1640a8095ec04408caf4660d4eb548fdfd9ad69ed00a1fe66fce3f041a800

  • \Windows\SysWOW64\JTBF.exe

    Filesize

    208KB

    MD5

    381d0033f66d58afc734a110723a58ca

    SHA1

    7a5483371ecee9a0462d83f7f727a710a64bb021

    SHA256

    70a6f696a64cbb8d3cc5607e3921deebf4cc14dedc12ba6a1f6901d4f71dc552

    SHA512

    54fb32553cc66995e0fbe7714835d3e6479e71c0272d3b04cb9ce855b4787c3556e1640a8095ec04408caf4660d4eb548fdfd9ad69ed00a1fe66fce3f041a800

  • memory/1080-15-0x0000000000130000-0x0000000000168000-memory.dmp

    Filesize

    224KB

  • memory/1080-18-0x0000000000130000-0x0000000000168000-memory.dmp

    Filesize

    224KB

  • memory/1080-22-0x0000000000130000-0x0000000000168000-memory.dmp

    Filesize

    224KB

  • memory/1132-20-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/1132-21-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2952-0-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2952-12-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB