Analysis
-
max time kernel
167s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0465a6b8d40c8a81f983baa94dd2bc20_JC.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.0465a6b8d40c8a81f983baa94dd2bc20_JC.dll
Resource
win10v2004-20230915-en
General
-
Target
NEAS.0465a6b8d40c8a81f983baa94dd2bc20_JC.dll
-
Size
25KB
-
MD5
0465a6b8d40c8a81f983baa94dd2bc20
-
SHA1
c8273bb4e4ce24f9e242bd71381a6cced672ee8f
-
SHA256
200b498de73fed1259f9268d6f0e75f8079ea4634f98864d335a342a735c1f1a
-
SHA512
6ade7bbcc3166e1e7062cb149f727a0b9aad552d838b94484aba62de97d13449d90c21f516ba3fe41d4c92909266da596e0a777f7ec0dc33f718d682d7fd5ebd
-
SSDEEP
768:VrHFI0/T/ltj9LEPgf2cTeXsulEt8f30MFseM:pHFJ3pLPf2qeXsoFFM
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\msvcr.dll rundll32.exe File opened for modification C:\Windows\msvcr.dll rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3AC3FA-B695-41b6-BAA0-860EB5EB6FD6} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7B3AC3FA-B695-41b6-BAA0-860EB5EB6FD6}\{F69EB73C-700A-42c9-8F9D-E8C4ABC27EF3} = "NEAS.0465a6b8d40c8a81f983baa94dd2bc20_JC.dll,1285097749,1563368310,-1814625877" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9} rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2360 wrote to memory of 756 2360 rundll32.exe 29 PID 2360 wrote to memory of 756 2360 rundll32.exe 29 PID 2360 wrote to memory of 756 2360 rundll32.exe 29 PID 2360 wrote to memory of 756 2360 rundll32.exe 29 PID 2360 wrote to memory of 756 2360 rundll32.exe 29 PID 2360 wrote to memory of 756 2360 rundll32.exe 29 PID 2360 wrote to memory of 756 2360 rundll32.exe 29 PID 756 wrote to memory of 2684 756 rundll32.exe 30 PID 756 wrote to memory of 2684 756 rundll32.exe 30 PID 756 wrote to memory of 2684 756 rundll32.exe 30 PID 756 wrote to memory of 2684 756 rundll32.exe 30 PID 756 wrote to memory of 2684 756 rundll32.exe 30 PID 756 wrote to memory of 2684 756 rundll32.exe 30 PID 756 wrote to memory of 2684 756 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.0465a6b8d40c8a81f983baa94dd2bc20_JC.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.0465a6b8d40c8a81f983baa94dd2bc20_JC.dll,#12⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Windows\msvcr.dll",_RunAs@03⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2684
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD50465a6b8d40c8a81f983baa94dd2bc20
SHA1c8273bb4e4ce24f9e242bd71381a6cced672ee8f
SHA256200b498de73fed1259f9268d6f0e75f8079ea4634f98864d335a342a735c1f1a
SHA5126ade7bbcc3166e1e7062cb149f727a0b9aad552d838b94484aba62de97d13449d90c21f516ba3fe41d4c92909266da596e0a777f7ec0dc33f718d682d7fd5ebd