Analysis

  • max time kernel
    73s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2023, 09:12

General

  • Target

    NEAS.2bcb29343dee3eafd61134b746c319c4_JC.exe

  • Size

    1.6MB

  • MD5

    2bcb29343dee3eafd61134b746c319c4

  • SHA1

    c3b5a9e09de7b331296046e72008e4ef27f131c9

  • SHA256

    201773393c1090fadd25060d6e6e6d8c560a37116adfc38da3f6907d7d8169a7

  • SHA512

    0e6654fcbec9cbd89e9afb80c02d7cb90c991358027fe31df39bf29cb76efed1c37604b84e9a719866cc5731ac31930a2fc444f685854d829090e7b738487b61

  • SSDEEP

    24576:M51x7cS9in6bxcqbF8fYTOYKbDurSUQN7kBG+JqJS+WOZseId9x0FOXr2rld:Mt7cS4neHbyfYTOYKPu/gEjiEO5ItDO

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.2bcb29343dee3eafd61134b746c319c4_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.2bcb29343dee3eafd61134b746c319c4_JC.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3156
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:3540
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev19DC.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.2bcb29343dee3eafd61134b746c319c4_JC.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3824
      • C:\Users\Admin\AppData\Local\Temp\NEAS.2BCB29343DEE3EAFD61134B746C319C4_JC.EXE
        3⤵
        • Sets service image path in registry
        • Executes dropped EXE
        • Suspicious behavior: LoadsDriver
        • Suspicious use of AdjustPrivilegeToken
        PID:3664
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev19DC.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.2BCB29343DEE3EAFD61134B746C319C4_JC.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:4296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\NEAS.2BCB29343DEE3EAFD61134B746C319C4_JC.EXE

    Filesize

    1.6MB

    MD5

    14336c6a3e3dc07c35cf7287717d1d0a

    SHA1

    2dea343b6c687090a1aea2ce6c442913d5bf3524

    SHA256

    1103fc2f5b11e2add4d5a02b539d6a543df601fef88a5b28c0d4201da27d219c

    SHA512

    8ae8c5a5ea3fa5d0135a172d2d66c9a42d3efa899c45128b6a688e27e144182dc293c59891d42438953014dd05fde404ccec703d70294b3f886a2fa791878f39

  • C:\Users\Admin\AppData\Local\Temp\NEAS.2BCB29343DEE3EAFD61134B746C319C4_JC.EXE

    Filesize

    1.6MB

    MD5

    14336c6a3e3dc07c35cf7287717d1d0a

    SHA1

    2dea343b6c687090a1aea2ce6c442913d5bf3524

    SHA256

    1103fc2f5b11e2add4d5a02b539d6a543df601fef88a5b28c0d4201da27d219c

    SHA512

    8ae8c5a5ea3fa5d0135a172d2d66c9a42d3efa899c45128b6a688e27e144182dc293c59891d42438953014dd05fde404ccec703d70294b3f886a2fa791878f39

  • C:\Users\Admin\AppData\Local\Temp\NEAS.2bcb29343dee3eafd61134b746c319c4_JC.exe

    Filesize

    11KB

    MD5

    9feff3c663336f7a555698bc2bc26f15

    SHA1

    2ae180fb131802e91922a153e3c497b807b4cd08

    SHA256

    8c6644f3623291ca88b8a6926093f75b21f3f3dcdb79cbce72205f295267b96c

    SHA512

    39c4f4db4fac609847a6c61f3c66828b9dd8a703043e7d6b7d07f71968c25625fedc84a110e6fed104bef278c585ddd497604452ef13b6d6927cc4bf08c96dbf

  • C:\Users\Admin\AppData\Local\Temp\NEAS.2bcb29343dee3eafd61134b746c319c4_JC.exe

    Filesize

    1.6MB

    MD5

    14336c6a3e3dc07c35cf7287717d1d0a

    SHA1

    2dea343b6c687090a1aea2ce6c442913d5bf3524

    SHA256

    1103fc2f5b11e2add4d5a02b539d6a543df601fef88a5b28c0d4201da27d219c

    SHA512

    8ae8c5a5ea3fa5d0135a172d2d66c9a42d3efa899c45128b6a688e27e144182dc293c59891d42438953014dd05fde404ccec703d70294b3f886a2fa791878f39

  • C:\WINDOWS\MSWDM.EXE

    Filesize

    1.6MB

    MD5

    859e3613f84d7fb1938d0385ea593f90

    SHA1

    0dce6abe18e7fad189d1c8643ce4e68f3e3a791d

    SHA256

    cf647f5991edb508710ca30a22f68057c0ee676e78a4c110a3a1c7e9746e6b89

    SHA512

    0a0e38f0ae0f02ca33ccac5617d1b0ec594b6fad9f0284d5d51add4d7ce28d83ea7a61805ad318a7561397a9ccdaa697b60f6c98ef4ca23dd4731d6fb7ae1adb

  • C:\Windows\MSWDM.EXE

    Filesize

    1.6MB

    MD5

    859e3613f84d7fb1938d0385ea593f90

    SHA1

    0dce6abe18e7fad189d1c8643ce4e68f3e3a791d

    SHA256

    cf647f5991edb508710ca30a22f68057c0ee676e78a4c110a3a1c7e9746e6b89

    SHA512

    0a0e38f0ae0f02ca33ccac5617d1b0ec594b6fad9f0284d5d51add4d7ce28d83ea7a61805ad318a7561397a9ccdaa697b60f6c98ef4ca23dd4731d6fb7ae1adb

  • C:\Windows\MSWDM.EXE

    Filesize

    1.6MB

    MD5

    859e3613f84d7fb1938d0385ea593f90

    SHA1

    0dce6abe18e7fad189d1c8643ce4e68f3e3a791d

    SHA256

    cf647f5991edb508710ca30a22f68057c0ee676e78a4c110a3a1c7e9746e6b89

    SHA512

    0a0e38f0ae0f02ca33ccac5617d1b0ec594b6fad9f0284d5d51add4d7ce28d83ea7a61805ad318a7561397a9ccdaa697b60f6c98ef4ca23dd4731d6fb7ae1adb

  • C:\Windows\MSWDM.EXE

    Filesize

    1.6MB

    MD5

    859e3613f84d7fb1938d0385ea593f90

    SHA1

    0dce6abe18e7fad189d1c8643ce4e68f3e3a791d

    SHA256

    cf647f5991edb508710ca30a22f68057c0ee676e78a4c110a3a1c7e9746e6b89

    SHA512

    0a0e38f0ae0f02ca33ccac5617d1b0ec594b6fad9f0284d5d51add4d7ce28d83ea7a61805ad318a7561397a9ccdaa697b60f6c98ef4ca23dd4731d6fb7ae1adb

  • C:\Windows\dev19DC.tmp

    Filesize

    11KB

    MD5

    9feff3c663336f7a555698bc2bc26f15

    SHA1

    2ae180fb131802e91922a153e3c497b807b4cd08

    SHA256

    8c6644f3623291ca88b8a6926093f75b21f3f3dcdb79cbce72205f295267b96c

    SHA512

    39c4f4db4fac609847a6c61f3c66828b9dd8a703043e7d6b7d07f71968c25625fedc84a110e6fed104bef278c585ddd497604452ef13b6d6927cc4bf08c96dbf

  • memory/3156-8-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/3156-0-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/3540-24-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/3664-14-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/3664-15-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/3824-10-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/3824-23-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4296-19-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4296-21-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB