Analysis
-
max time kernel
157s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 10:07
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe
-
Size
344KB
-
MD5
762b999bd909960b626a28dcf5cddc73
-
SHA1
37905655a9f19eb7ad59b70f1a267a5102230f2e
-
SHA256
287cabafd52ea787d5c78e950b11b66cfa60ef8c5b3e73b0cf0cc520c44c1694
-
SHA512
9dcf48fb5c44f15a0577948b0e1e0da66ed745a3baad6ab61c0c52f5eb3991a762d3949e860c06743e7a53493244c273a34daae5542026c756d4c17f33552ee9
-
SSDEEP
3072:oqpRkS2Eyi9+K1hrbi5k5fbIY2DV4weWx4d2Vuwaxv:oyNVKDDx6dR
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1976 updatIEaspx.exe 1860 updatIEaspx.exe 948 updatIEaspx.exe -
Loads dropped DLL 5 IoCs
pid Process 1600 NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe 1600 NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe 1600 NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe 1600 NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe 1600 NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe -
resource yara_rule behavioral1/memory/1600-89-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1600-91-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1600-95-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1600-97-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1600-99-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1600-100-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1600-107-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1600-117-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1600-145-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1600-266-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1860-269-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Run\IEupdates = "C:\\Users\\Admin\\AppData\\Roaming\\IExplorer\\updatIEaspx.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2348 set thread context of 1600 2348 NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe 30 PID 1976 set thread context of 1860 1976 updatIEaspx.exe 35 PID 1976 set thread context of 948 1976 updatIEaspx.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 1860 updatIEaspx.exe Token: SeDebugPrivilege 1860 updatIEaspx.exe Token: SeDebugPrivilege 1860 updatIEaspx.exe Token: SeDebugPrivilege 1860 updatIEaspx.exe Token: SeDebugPrivilege 1860 updatIEaspx.exe Token: SeDebugPrivilege 1860 updatIEaspx.exe Token: SeDebugPrivilege 1860 updatIEaspx.exe Token: SeDebugPrivilege 1860 updatIEaspx.exe Token: SeDebugPrivilege 1860 updatIEaspx.exe Token: SeDebugPrivilege 1860 updatIEaspx.exe Token: SeDebugPrivilege 1860 updatIEaspx.exe Token: SeDebugPrivilege 1860 updatIEaspx.exe Token: SeDebugPrivilege 1860 updatIEaspx.exe Token: SeDebugPrivilege 1860 updatIEaspx.exe Token: SeDebugPrivilege 1860 updatIEaspx.exe Token: SeDebugPrivilege 1860 updatIEaspx.exe Token: SeDebugPrivilege 1860 updatIEaspx.exe Token: SeDebugPrivilege 1860 updatIEaspx.exe Token: SeDebugPrivilege 1860 updatIEaspx.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2348 NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe 1600 NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe 1976 updatIEaspx.exe 1860 updatIEaspx.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1600 2348 NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe 30 PID 2348 wrote to memory of 1600 2348 NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe 30 PID 2348 wrote to memory of 1600 2348 NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe 30 PID 2348 wrote to memory of 1600 2348 NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe 30 PID 2348 wrote to memory of 1600 2348 NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe 30 PID 2348 wrote to memory of 1600 2348 NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe 30 PID 2348 wrote to memory of 1600 2348 NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe 30 PID 2348 wrote to memory of 1600 2348 NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe 30 PID 1600 wrote to memory of 2400 1600 NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe 31 PID 1600 wrote to memory of 2400 1600 NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe 31 PID 1600 wrote to memory of 2400 1600 NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe 31 PID 1600 wrote to memory of 2400 1600 NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe 31 PID 2400 wrote to memory of 1820 2400 cmd.exe 33 PID 2400 wrote to memory of 1820 2400 cmd.exe 33 PID 2400 wrote to memory of 1820 2400 cmd.exe 33 PID 2400 wrote to memory of 1820 2400 cmd.exe 33 PID 1600 wrote to memory of 1976 1600 NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe 34 PID 1600 wrote to memory of 1976 1600 NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe 34 PID 1600 wrote to memory of 1976 1600 NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe 34 PID 1600 wrote to memory of 1976 1600 NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe 34 PID 1976 wrote to memory of 1860 1976 updatIEaspx.exe 35 PID 1976 wrote to memory of 1860 1976 updatIEaspx.exe 35 PID 1976 wrote to memory of 1860 1976 updatIEaspx.exe 35 PID 1976 wrote to memory of 1860 1976 updatIEaspx.exe 35 PID 1976 wrote to memory of 1860 1976 updatIEaspx.exe 35 PID 1976 wrote to memory of 1860 1976 updatIEaspx.exe 35 PID 1976 wrote to memory of 1860 1976 updatIEaspx.exe 35 PID 1976 wrote to memory of 1860 1976 updatIEaspx.exe 35 PID 1976 wrote to memory of 948 1976 updatIEaspx.exe 36 PID 1976 wrote to memory of 948 1976 updatIEaspx.exe 36 PID 1976 wrote to memory of 948 1976 updatIEaspx.exe 36 PID 1976 wrote to memory of 948 1976 updatIEaspx.exe 36 PID 1976 wrote to memory of 948 1976 updatIEaspx.exe 36 PID 1976 wrote to memory of 948 1976 updatIEaspx.exe 36 PID 1976 wrote to memory of 948 1976 updatIEaspx.exe 36 PID 1976 wrote to memory of 948 1976 updatIEaspx.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ADOQL.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "IEupdates" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\IExplorer\updatIEaspx.exe" /f4⤵
- Adds Run key to start application
PID:1820
-
-
-
C:\Users\Admin\AppData\Roaming\IExplorer\updatIEaspx.exe"C:\Users\Admin\AppData\Roaming\IExplorer\updatIEaspx.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Roaming\IExplorer\updatIEaspx.exe"C:\Users\Admin\AppData\Roaming\IExplorer\updatIEaspx.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1860
-
-
C:\Users\Admin\AppData\Roaming\IExplorer\updatIEaspx.exe"C:\Users\Admin\AppData\Roaming\IExplorer\updatIEaspx.exe"4⤵
- Executes dropped EXE
PID:948
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56baf9bd338eea5c9acaca1e3fccae100
SHA13b9c8ae4361926e794200e75050b83e07a77223e
SHA256b407b67844e090358041172e616517e32c6cf1101a5c142b1f4a336602e22730
SHA51249a21d1415450c3649b76fd55291c8520e9fd4c908639e177116a6141474565f82f06f2dcd097e7b12bba9a987628ce2fa2f280c87bc0d734ec87101ab2ccb01
-
Filesize
152B
MD56baf9bd338eea5c9acaca1e3fccae100
SHA13b9c8ae4361926e794200e75050b83e07a77223e
SHA256b407b67844e090358041172e616517e32c6cf1101a5c142b1f4a336602e22730
SHA51249a21d1415450c3649b76fd55291c8520e9fd4c908639e177116a6141474565f82f06f2dcd097e7b12bba9a987628ce2fa2f280c87bc0d734ec87101ab2ccb01
-
Filesize
344KB
MD5132f627b063b6babd3b9b39bf11eab7d
SHA10256d8ed719c4964c3d6085f21564fbd2a100510
SHA256d3bd1b8ee3ebd88dfb3109f3f7a61d8d397549063d128504445f8867aa665b58
SHA5127df5a8f1fc9479447a14acf1810e6aaf6fe2800141c9563a02adfc2150f8a467cb99187edf2282306a0db866f3714fd9f176e2b5a46922f3ee00b52a409d9b80
-
Filesize
344KB
MD5132f627b063b6babd3b9b39bf11eab7d
SHA10256d8ed719c4964c3d6085f21564fbd2a100510
SHA256d3bd1b8ee3ebd88dfb3109f3f7a61d8d397549063d128504445f8867aa665b58
SHA5127df5a8f1fc9479447a14acf1810e6aaf6fe2800141c9563a02adfc2150f8a467cb99187edf2282306a0db866f3714fd9f176e2b5a46922f3ee00b52a409d9b80
-
Filesize
344KB
MD5132f627b063b6babd3b9b39bf11eab7d
SHA10256d8ed719c4964c3d6085f21564fbd2a100510
SHA256d3bd1b8ee3ebd88dfb3109f3f7a61d8d397549063d128504445f8867aa665b58
SHA5127df5a8f1fc9479447a14acf1810e6aaf6fe2800141c9563a02adfc2150f8a467cb99187edf2282306a0db866f3714fd9f176e2b5a46922f3ee00b52a409d9b80
-
Filesize
344KB
MD5132f627b063b6babd3b9b39bf11eab7d
SHA10256d8ed719c4964c3d6085f21564fbd2a100510
SHA256d3bd1b8ee3ebd88dfb3109f3f7a61d8d397549063d128504445f8867aa665b58
SHA5127df5a8f1fc9479447a14acf1810e6aaf6fe2800141c9563a02adfc2150f8a467cb99187edf2282306a0db866f3714fd9f176e2b5a46922f3ee00b52a409d9b80
-
Filesize
344KB
MD5132f627b063b6babd3b9b39bf11eab7d
SHA10256d8ed719c4964c3d6085f21564fbd2a100510
SHA256d3bd1b8ee3ebd88dfb3109f3f7a61d8d397549063d128504445f8867aa665b58
SHA5127df5a8f1fc9479447a14acf1810e6aaf6fe2800141c9563a02adfc2150f8a467cb99187edf2282306a0db866f3714fd9f176e2b5a46922f3ee00b52a409d9b80
-
Filesize
344KB
MD5132f627b063b6babd3b9b39bf11eab7d
SHA10256d8ed719c4964c3d6085f21564fbd2a100510
SHA256d3bd1b8ee3ebd88dfb3109f3f7a61d8d397549063d128504445f8867aa665b58
SHA5127df5a8f1fc9479447a14acf1810e6aaf6fe2800141c9563a02adfc2150f8a467cb99187edf2282306a0db866f3714fd9f176e2b5a46922f3ee00b52a409d9b80
-
Filesize
344KB
MD5132f627b063b6babd3b9b39bf11eab7d
SHA10256d8ed719c4964c3d6085f21564fbd2a100510
SHA256d3bd1b8ee3ebd88dfb3109f3f7a61d8d397549063d128504445f8867aa665b58
SHA5127df5a8f1fc9479447a14acf1810e6aaf6fe2800141c9563a02adfc2150f8a467cb99187edf2282306a0db866f3714fd9f176e2b5a46922f3ee00b52a409d9b80
-
Filesize
344KB
MD5132f627b063b6babd3b9b39bf11eab7d
SHA10256d8ed719c4964c3d6085f21564fbd2a100510
SHA256d3bd1b8ee3ebd88dfb3109f3f7a61d8d397549063d128504445f8867aa665b58
SHA5127df5a8f1fc9479447a14acf1810e6aaf6fe2800141c9563a02adfc2150f8a467cb99187edf2282306a0db866f3714fd9f176e2b5a46922f3ee00b52a409d9b80
-
Filesize
344KB
MD5132f627b063b6babd3b9b39bf11eab7d
SHA10256d8ed719c4964c3d6085f21564fbd2a100510
SHA256d3bd1b8ee3ebd88dfb3109f3f7a61d8d397549063d128504445f8867aa665b58
SHA5127df5a8f1fc9479447a14acf1810e6aaf6fe2800141c9563a02adfc2150f8a467cb99187edf2282306a0db866f3714fd9f176e2b5a46922f3ee00b52a409d9b80
-
Filesize
344KB
MD5132f627b063b6babd3b9b39bf11eab7d
SHA10256d8ed719c4964c3d6085f21564fbd2a100510
SHA256d3bd1b8ee3ebd88dfb3109f3f7a61d8d397549063d128504445f8867aa665b58
SHA5127df5a8f1fc9479447a14acf1810e6aaf6fe2800141c9563a02adfc2150f8a467cb99187edf2282306a0db866f3714fd9f176e2b5a46922f3ee00b52a409d9b80