Analysis

  • max time kernel
    157s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2023, 10:07

General

  • Target

    NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe

  • Size

    344KB

  • MD5

    762b999bd909960b626a28dcf5cddc73

  • SHA1

    37905655a9f19eb7ad59b70f1a267a5102230f2e

  • SHA256

    287cabafd52ea787d5c78e950b11b66cfa60ef8c5b3e73b0cf0cc520c44c1694

  • SHA512

    9dcf48fb5c44f15a0577948b0e1e0da66ed745a3baad6ab61c0c52f5eb3991a762d3949e860c06743e7a53493244c273a34daae5542026c756d4c17f33552ee9

  • SSDEEP

    3072:oqpRkS2Eyi9+K1hrbi5k5fbIY2DV4weWx4d2Vuwaxv:oyNVKDDx6dR

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Users\Admin\AppData\Local\Temp\NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe
      "C:\Users\Admin\AppData\Local\Temp\NEAS.762b999bd909960b626a28dcf5cddc73_JC.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1600
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\ADOQL.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2400
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "IEupdates" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\IExplorer\updatIEaspx.exe" /f
          4⤵
          • Adds Run key to start application
          PID:1820
      • C:\Users\Admin\AppData\Roaming\IExplorer\updatIEaspx.exe
        "C:\Users\Admin\AppData\Roaming\IExplorer\updatIEaspx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1976
        • C:\Users\Admin\AppData\Roaming\IExplorer\updatIEaspx.exe
          "C:\Users\Admin\AppData\Roaming\IExplorer\updatIEaspx.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1860
        • C:\Users\Admin\AppData\Roaming\IExplorer\updatIEaspx.exe
          "C:\Users\Admin\AppData\Roaming\IExplorer\updatIEaspx.exe"
          4⤵
          • Executes dropped EXE
          PID:948

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\ADOQL.bat

          Filesize

          152B

          MD5

          6baf9bd338eea5c9acaca1e3fccae100

          SHA1

          3b9c8ae4361926e794200e75050b83e07a77223e

          SHA256

          b407b67844e090358041172e616517e32c6cf1101a5c142b1f4a336602e22730

          SHA512

          49a21d1415450c3649b76fd55291c8520e9fd4c908639e177116a6141474565f82f06f2dcd097e7b12bba9a987628ce2fa2f280c87bc0d734ec87101ab2ccb01

        • C:\Users\Admin\AppData\Local\Temp\ADOQL.bat

          Filesize

          152B

          MD5

          6baf9bd338eea5c9acaca1e3fccae100

          SHA1

          3b9c8ae4361926e794200e75050b83e07a77223e

          SHA256

          b407b67844e090358041172e616517e32c6cf1101a5c142b1f4a336602e22730

          SHA512

          49a21d1415450c3649b76fd55291c8520e9fd4c908639e177116a6141474565f82f06f2dcd097e7b12bba9a987628ce2fa2f280c87bc0d734ec87101ab2ccb01

        • C:\Users\Admin\AppData\Roaming\IExplorer\updatIEaspx.exe

          Filesize

          344KB

          MD5

          132f627b063b6babd3b9b39bf11eab7d

          SHA1

          0256d8ed719c4964c3d6085f21564fbd2a100510

          SHA256

          d3bd1b8ee3ebd88dfb3109f3f7a61d8d397549063d128504445f8867aa665b58

          SHA512

          7df5a8f1fc9479447a14acf1810e6aaf6fe2800141c9563a02adfc2150f8a467cb99187edf2282306a0db866f3714fd9f176e2b5a46922f3ee00b52a409d9b80

        • C:\Users\Admin\AppData\Roaming\IExplorer\updatIEaspx.exe

          Filesize

          344KB

          MD5

          132f627b063b6babd3b9b39bf11eab7d

          SHA1

          0256d8ed719c4964c3d6085f21564fbd2a100510

          SHA256

          d3bd1b8ee3ebd88dfb3109f3f7a61d8d397549063d128504445f8867aa665b58

          SHA512

          7df5a8f1fc9479447a14acf1810e6aaf6fe2800141c9563a02adfc2150f8a467cb99187edf2282306a0db866f3714fd9f176e2b5a46922f3ee00b52a409d9b80

        • C:\Users\Admin\AppData\Roaming\IExplorer\updatIEaspx.exe

          Filesize

          344KB

          MD5

          132f627b063b6babd3b9b39bf11eab7d

          SHA1

          0256d8ed719c4964c3d6085f21564fbd2a100510

          SHA256

          d3bd1b8ee3ebd88dfb3109f3f7a61d8d397549063d128504445f8867aa665b58

          SHA512

          7df5a8f1fc9479447a14acf1810e6aaf6fe2800141c9563a02adfc2150f8a467cb99187edf2282306a0db866f3714fd9f176e2b5a46922f3ee00b52a409d9b80

        • C:\Users\Admin\AppData\Roaming\IExplorer\updatIEaspx.exe

          Filesize

          344KB

          MD5

          132f627b063b6babd3b9b39bf11eab7d

          SHA1

          0256d8ed719c4964c3d6085f21564fbd2a100510

          SHA256

          d3bd1b8ee3ebd88dfb3109f3f7a61d8d397549063d128504445f8867aa665b58

          SHA512

          7df5a8f1fc9479447a14acf1810e6aaf6fe2800141c9563a02adfc2150f8a467cb99187edf2282306a0db866f3714fd9f176e2b5a46922f3ee00b52a409d9b80

        • C:\Users\Admin\AppData\Roaming\IExplorer\updatIEaspx.exe

          Filesize

          344KB

          MD5

          132f627b063b6babd3b9b39bf11eab7d

          SHA1

          0256d8ed719c4964c3d6085f21564fbd2a100510

          SHA256

          d3bd1b8ee3ebd88dfb3109f3f7a61d8d397549063d128504445f8867aa665b58

          SHA512

          7df5a8f1fc9479447a14acf1810e6aaf6fe2800141c9563a02adfc2150f8a467cb99187edf2282306a0db866f3714fd9f176e2b5a46922f3ee00b52a409d9b80

        • \Users\Admin\AppData\Roaming\IExplorer\updatIEaspx.exe

          Filesize

          344KB

          MD5

          132f627b063b6babd3b9b39bf11eab7d

          SHA1

          0256d8ed719c4964c3d6085f21564fbd2a100510

          SHA256

          d3bd1b8ee3ebd88dfb3109f3f7a61d8d397549063d128504445f8867aa665b58

          SHA512

          7df5a8f1fc9479447a14acf1810e6aaf6fe2800141c9563a02adfc2150f8a467cb99187edf2282306a0db866f3714fd9f176e2b5a46922f3ee00b52a409d9b80

        • \Users\Admin\AppData\Roaming\IExplorer\updatIEaspx.exe

          Filesize

          344KB

          MD5

          132f627b063b6babd3b9b39bf11eab7d

          SHA1

          0256d8ed719c4964c3d6085f21564fbd2a100510

          SHA256

          d3bd1b8ee3ebd88dfb3109f3f7a61d8d397549063d128504445f8867aa665b58

          SHA512

          7df5a8f1fc9479447a14acf1810e6aaf6fe2800141c9563a02adfc2150f8a467cb99187edf2282306a0db866f3714fd9f176e2b5a46922f3ee00b52a409d9b80

        • \Users\Admin\AppData\Roaming\IExplorer\updatIEaspx.exe

          Filesize

          344KB

          MD5

          132f627b063b6babd3b9b39bf11eab7d

          SHA1

          0256d8ed719c4964c3d6085f21564fbd2a100510

          SHA256

          d3bd1b8ee3ebd88dfb3109f3f7a61d8d397549063d128504445f8867aa665b58

          SHA512

          7df5a8f1fc9479447a14acf1810e6aaf6fe2800141c9563a02adfc2150f8a467cb99187edf2282306a0db866f3714fd9f176e2b5a46922f3ee00b52a409d9b80

        • \Users\Admin\AppData\Roaming\IExplorer\updatIEaspx.exe

          Filesize

          344KB

          MD5

          132f627b063b6babd3b9b39bf11eab7d

          SHA1

          0256d8ed719c4964c3d6085f21564fbd2a100510

          SHA256

          d3bd1b8ee3ebd88dfb3109f3f7a61d8d397549063d128504445f8867aa665b58

          SHA512

          7df5a8f1fc9479447a14acf1810e6aaf6fe2800141c9563a02adfc2150f8a467cb99187edf2282306a0db866f3714fd9f176e2b5a46922f3ee00b52a409d9b80

        • \Users\Admin\AppData\Roaming\IExplorer\updatIEaspx.exe

          Filesize

          344KB

          MD5

          132f627b063b6babd3b9b39bf11eab7d

          SHA1

          0256d8ed719c4964c3d6085f21564fbd2a100510

          SHA256

          d3bd1b8ee3ebd88dfb3109f3f7a61d8d397549063d128504445f8867aa665b58

          SHA512

          7df5a8f1fc9479447a14acf1810e6aaf6fe2800141c9563a02adfc2150f8a467cb99187edf2282306a0db866f3714fd9f176e2b5a46922f3ee00b52a409d9b80

        • memory/1600-117-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1600-89-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1600-95-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1600-97-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1600-99-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1600-100-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1600-107-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1600-91-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1600-93-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/1600-145-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1600-87-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1600-266-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1860-269-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1976-250-0x00000000005A0000-0x00000000005A1000-memory.dmp

          Filesize

          4KB

        • memory/1976-230-0x00000000003E0000-0x00000000003E1000-memory.dmp

          Filesize

          4KB

        • memory/1976-223-0x0000000000330000-0x0000000000331000-memory.dmp

          Filesize

          4KB

        • memory/1976-178-0x0000000000280000-0x0000000000281000-memory.dmp

          Filesize

          4KB

        • memory/1976-158-0x0000000000260000-0x0000000000261000-memory.dmp

          Filesize

          4KB

        • memory/1976-148-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/2348-2-0x00000000001D0000-0x00000000001D1000-memory.dmp

          Filesize

          4KB

        • memory/2348-44-0x0000000000290000-0x0000000000291000-memory.dmp

          Filesize

          4KB

        • memory/2348-58-0x00000000002A0000-0x00000000002A1000-memory.dmp

          Filesize

          4KB

        • memory/2348-79-0x00000000002A0000-0x00000000002A1000-memory.dmp

          Filesize

          4KB

        • memory/2348-34-0x0000000000280000-0x0000000000281000-memory.dmp

          Filesize

          4KB

        • memory/2348-14-0x00000000001E0000-0x00000000001E1000-memory.dmp

          Filesize

          4KB

        • memory/2348-80-0x00000000002B0000-0x00000000002B1000-memory.dmp

          Filesize

          4KB

        • memory/2348-4-0x00000000001D0000-0x00000000001D1000-memory.dmp

          Filesize

          4KB

        • memory/2348-81-0x00000000002C0000-0x00000000002C1000-memory.dmp

          Filesize

          4KB

        • memory/2348-86-0x00000000003E0000-0x00000000003E1000-memory.dmp

          Filesize

          4KB