Analysis
-
max time kernel
73s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 09:12
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2bcb29343dee3eafd61134b746c319c4_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.2bcb29343dee3eafd61134b746c319c4_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.2bcb29343dee3eafd61134b746c319c4_JC.exe
-
Size
1.6MB
-
MD5
2bcb29343dee3eafd61134b746c319c4
-
SHA1
c3b5a9e09de7b331296046e72008e4ef27f131c9
-
SHA256
201773393c1090fadd25060d6e6e6d8c560a37116adfc38da3f6907d7d8169a7
-
SHA512
0e6654fcbec9cbd89e9afb80c02d7cb90c991358027fe31df39bf29cb76efed1c37604b84e9a719866cc5731ac31930a2fc444f685854d829090e7b738487b61
-
SSDEEP
24576:M51x7cS9in6bxcqbF8fYTOYKbDurSUQN7kBG+JqJS+WOZseId9x0FOXr2rld:Mt7cS4neHbyfYTOYKPu/gEjiEO5ItDO
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\fakerdtsc\ImagePath = 5c003f003f005c0043003a005c00550073006500720073005c00410064006d0069006e005c0041007000700044006100740061005c004c006f00630061006c005c00540065006d0070005c00660061006b006500720064007400730063002e007300790073000000 NEAS.2BCB29343DEE3EAFD61134B746C319C4_JC.EXE -
Executes dropped EXE 4 IoCs
pid Process 3540 MSWDM.EXE 3824 MSWDM.EXE 3664 NEAS.2BCB29343DEE3EAFD61134B746C319C4_JC.EXE 4296 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" NEAS.2bcb29343dee3eafd61134b746c319c4_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" NEAS.2bcb29343dee3eafd61134b746c319c4_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE NEAS.2bcb29343dee3eafd61134b746c319c4_JC.exe File opened for modification C:\Windows\dev19DC.tmp NEAS.2bcb29343dee3eafd61134b746c319c4_JC.exe File opened for modification C:\Windows\dev19DC.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3824 MSWDM.EXE 3824 MSWDM.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 3664 NEAS.2BCB29343DEE3EAFD61134B746C319C4_JC.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 3664 NEAS.2BCB29343DEE3EAFD61134B746C319C4_JC.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3156 wrote to memory of 3540 3156 NEAS.2bcb29343dee3eafd61134b746c319c4_JC.exe 88 PID 3156 wrote to memory of 3540 3156 NEAS.2bcb29343dee3eafd61134b746c319c4_JC.exe 88 PID 3156 wrote to memory of 3540 3156 NEAS.2bcb29343dee3eafd61134b746c319c4_JC.exe 88 PID 3156 wrote to memory of 3824 3156 NEAS.2bcb29343dee3eafd61134b746c319c4_JC.exe 89 PID 3156 wrote to memory of 3824 3156 NEAS.2bcb29343dee3eafd61134b746c319c4_JC.exe 89 PID 3156 wrote to memory of 3824 3156 NEAS.2bcb29343dee3eafd61134b746c319c4_JC.exe 89 PID 3824 wrote to memory of 3664 3824 MSWDM.EXE 90 PID 3824 wrote to memory of 3664 3824 MSWDM.EXE 90 PID 3824 wrote to memory of 3664 3824 MSWDM.EXE 90 PID 3824 wrote to memory of 4296 3824 MSWDM.EXE 91 PID 3824 wrote to memory of 4296 3824 MSWDM.EXE 91 PID 3824 wrote to memory of 4296 3824 MSWDM.EXE 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2bcb29343dee3eafd61134b746c319c4_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2bcb29343dee3eafd61134b746c319c4_JC.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3540
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev19DC.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.2bcb29343dee3eafd61134b746c319c4_JC.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\NEAS.2BCB29343DEE3EAFD61134B746C319C4_JC.EXE
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:3664
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev19DC.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.2BCB29343DEE3EAFD61134B746C319C4_JC.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4296
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD514336c6a3e3dc07c35cf7287717d1d0a
SHA12dea343b6c687090a1aea2ce6c442913d5bf3524
SHA2561103fc2f5b11e2add4d5a02b539d6a543df601fef88a5b28c0d4201da27d219c
SHA5128ae8c5a5ea3fa5d0135a172d2d66c9a42d3efa899c45128b6a688e27e144182dc293c59891d42438953014dd05fde404ccec703d70294b3f886a2fa791878f39
-
Filesize
1.6MB
MD514336c6a3e3dc07c35cf7287717d1d0a
SHA12dea343b6c687090a1aea2ce6c442913d5bf3524
SHA2561103fc2f5b11e2add4d5a02b539d6a543df601fef88a5b28c0d4201da27d219c
SHA5128ae8c5a5ea3fa5d0135a172d2d66c9a42d3efa899c45128b6a688e27e144182dc293c59891d42438953014dd05fde404ccec703d70294b3f886a2fa791878f39
-
Filesize
11KB
MD59feff3c663336f7a555698bc2bc26f15
SHA12ae180fb131802e91922a153e3c497b807b4cd08
SHA2568c6644f3623291ca88b8a6926093f75b21f3f3dcdb79cbce72205f295267b96c
SHA51239c4f4db4fac609847a6c61f3c66828b9dd8a703043e7d6b7d07f71968c25625fedc84a110e6fed104bef278c585ddd497604452ef13b6d6927cc4bf08c96dbf
-
Filesize
1.6MB
MD514336c6a3e3dc07c35cf7287717d1d0a
SHA12dea343b6c687090a1aea2ce6c442913d5bf3524
SHA2561103fc2f5b11e2add4d5a02b539d6a543df601fef88a5b28c0d4201da27d219c
SHA5128ae8c5a5ea3fa5d0135a172d2d66c9a42d3efa899c45128b6a688e27e144182dc293c59891d42438953014dd05fde404ccec703d70294b3f886a2fa791878f39
-
Filesize
1.6MB
MD5859e3613f84d7fb1938d0385ea593f90
SHA10dce6abe18e7fad189d1c8643ce4e68f3e3a791d
SHA256cf647f5991edb508710ca30a22f68057c0ee676e78a4c110a3a1c7e9746e6b89
SHA5120a0e38f0ae0f02ca33ccac5617d1b0ec594b6fad9f0284d5d51add4d7ce28d83ea7a61805ad318a7561397a9ccdaa697b60f6c98ef4ca23dd4731d6fb7ae1adb
-
Filesize
1.6MB
MD5859e3613f84d7fb1938d0385ea593f90
SHA10dce6abe18e7fad189d1c8643ce4e68f3e3a791d
SHA256cf647f5991edb508710ca30a22f68057c0ee676e78a4c110a3a1c7e9746e6b89
SHA5120a0e38f0ae0f02ca33ccac5617d1b0ec594b6fad9f0284d5d51add4d7ce28d83ea7a61805ad318a7561397a9ccdaa697b60f6c98ef4ca23dd4731d6fb7ae1adb
-
Filesize
1.6MB
MD5859e3613f84d7fb1938d0385ea593f90
SHA10dce6abe18e7fad189d1c8643ce4e68f3e3a791d
SHA256cf647f5991edb508710ca30a22f68057c0ee676e78a4c110a3a1c7e9746e6b89
SHA5120a0e38f0ae0f02ca33ccac5617d1b0ec594b6fad9f0284d5d51add4d7ce28d83ea7a61805ad318a7561397a9ccdaa697b60f6c98ef4ca23dd4731d6fb7ae1adb
-
Filesize
1.6MB
MD5859e3613f84d7fb1938d0385ea593f90
SHA10dce6abe18e7fad189d1c8643ce4e68f3e3a791d
SHA256cf647f5991edb508710ca30a22f68057c0ee676e78a4c110a3a1c7e9746e6b89
SHA5120a0e38f0ae0f02ca33ccac5617d1b0ec594b6fad9f0284d5d51add4d7ce28d83ea7a61805ad318a7561397a9ccdaa697b60f6c98ef4ca23dd4731d6fb7ae1adb
-
Filesize
11KB
MD59feff3c663336f7a555698bc2bc26f15
SHA12ae180fb131802e91922a153e3c497b807b4cd08
SHA2568c6644f3623291ca88b8a6926093f75b21f3f3dcdb79cbce72205f295267b96c
SHA51239c4f4db4fac609847a6c61f3c66828b9dd8a703043e7d6b7d07f71968c25625fedc84a110e6fed104bef278c585ddd497604452ef13b6d6927cc4bf08c96dbf