Analysis

  • max time kernel
    193s
  • max time network
    220s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2023, 08:39

General

  • Target

    NEAS.043b1de4c31441798c110df9b7c2cb61565ad22fc93fe0f4f4741440bbee392fexe_JC.exe

  • Size

    1.2MB

  • MD5

    76878d6c71cbfe3258a62d9aeee7ff42

  • SHA1

    01302a0041d6c8cd3bd5794b0fa14aa489c57160

  • SHA256

    043b1de4c31441798c110df9b7c2cb61565ad22fc93fe0f4f4741440bbee392f

  • SHA512

    715480b061e7eb34cef290baa30b7409f3f89fd6438358fd0282cd5b6f265881f6f8563cea5af61cdb92c4d72ee1d1d4942c0b1f5e06d75428df28d33dd4bd65

  • SSDEEP

    24576:66y0XfLMRAWmyA7NsOWB7ujJi+sSZDcS9TEKL4qT/XLzEk6CY9ysdeLtXB/T:o0vL+4P7uHuF9sSJb9T1M+vEcY4X/

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.043b1de4c31441798c110df9b7c2cb61565ad22fc93fe0f4f4741440bbee392fexe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.043b1de4c31441798c110df9b7c2cb61565ad22fc93fe0f4f4741440bbee392fexe_JC.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5116
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lM2sR47.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lM2sR47.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3964
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kv6Wm90.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kv6Wm90.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3464
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\JA3Wz50.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\JA3Wz50.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1536
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Lh34ir5.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Lh34ir5.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1588
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:5080
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 564
              6⤵
              • Program crash
              PID:4116
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1588 -ip 1588
    1⤵
      PID:3596

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lM2sR47.exe

            Filesize

            1.1MB

            MD5

            aeb770013111e3cc0adacaa0512e1f18

            SHA1

            70cb5a97a49903cded1075e22420f9ae4fb37368

            SHA256

            2248937d9559ed4925384250a311e8ceb5b14abbba820fea5639319ac549ea45

            SHA512

            98d5e1cc97c4c88a7a2da2dda1ecd9b8f41a31f57d7ff72940b0dd094d4fff72c91e0a4dd4250a4d88534cdd131f77d7df9e7475f7bb79674bf6e3a46e0914af

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lM2sR47.exe

            Filesize

            1.1MB

            MD5

            aeb770013111e3cc0adacaa0512e1f18

            SHA1

            70cb5a97a49903cded1075e22420f9ae4fb37368

            SHA256

            2248937d9559ed4925384250a311e8ceb5b14abbba820fea5639319ac549ea45

            SHA512

            98d5e1cc97c4c88a7a2da2dda1ecd9b8f41a31f57d7ff72940b0dd094d4fff72c91e0a4dd4250a4d88534cdd131f77d7df9e7475f7bb79674bf6e3a46e0914af

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kv6Wm90.exe

            Filesize

            690KB

            MD5

            5fd886f2984e1eab27632fc535d90c41

            SHA1

            235c1e9e01afa104ebf30b4c9bddcadf22c1c4e4

            SHA256

            ee1e908013cfcafd24fb9eae51c68f818683cfa613c73784577ecd57a0453239

            SHA512

            a775e0b6781aa248e94028e3391fe5c1d5dd53dfb81ca0953c8a3fab7bb153276311f6237d7bbaf534b4edceb81e61aea4356dcf32564a3c77c9e4bcafce56df

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kv6Wm90.exe

            Filesize

            690KB

            MD5

            5fd886f2984e1eab27632fc535d90c41

            SHA1

            235c1e9e01afa104ebf30b4c9bddcadf22c1c4e4

            SHA256

            ee1e908013cfcafd24fb9eae51c68f818683cfa613c73784577ecd57a0453239

            SHA512

            a775e0b6781aa248e94028e3391fe5c1d5dd53dfb81ca0953c8a3fab7bb153276311f6237d7bbaf534b4edceb81e61aea4356dcf32564a3c77c9e4bcafce56df

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\JA3Wz50.exe

            Filesize

            330KB

            MD5

            f0f98917b605178ce37231d1f0ace2e8

            SHA1

            cd694985516b864060ec2a7ebe54c03b7fa5537d

            SHA256

            9770e842b54bc26898d000d661b5b336aa82c7de0c55fe26e8ca4a97bfd1648c

            SHA512

            99f880ba600c8b24d5bde6077224879bf0400bf148b1023ab924b5abcc05504a1eeba7d11b09a3a62fbec4a01068b2d548e0f19cba515d9b27f7f95716d532fc

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\JA3Wz50.exe

            Filesize

            330KB

            MD5

            f0f98917b605178ce37231d1f0ace2e8

            SHA1

            cd694985516b864060ec2a7ebe54c03b7fa5537d

            SHA256

            9770e842b54bc26898d000d661b5b336aa82c7de0c55fe26e8ca4a97bfd1648c

            SHA512

            99f880ba600c8b24d5bde6077224879bf0400bf148b1023ab924b5abcc05504a1eeba7d11b09a3a62fbec4a01068b2d548e0f19cba515d9b27f7f95716d532fc

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Lh34ir5.exe

            Filesize

            232KB

            MD5

            3ff825411b1fe07e712a5dcae34f80eb

            SHA1

            e3e4358cabfa74d6e36e26754b01ed78434a6877

            SHA256

            69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

            SHA512

            325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Lh34ir5.exe

            Filesize

            232KB

            MD5

            3ff825411b1fe07e712a5dcae34f80eb

            SHA1

            e3e4358cabfa74d6e36e26754b01ed78434a6877

            SHA256

            69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

            SHA512

            325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

          • memory/5080-28-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB

          • memory/5080-29-0x00000000746D0000-0x0000000074E80000-memory.dmp

            Filesize

            7.7MB

          • memory/5080-30-0x00000000746D0000-0x0000000074E80000-memory.dmp

            Filesize

            7.7MB