Analysis

  • max time kernel
    157s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2023, 09:25

General

  • Target

    NEAS.4023c46f4952ba455975ea1e4ca84dc160881ade28418fa58e44b430f436fe8eexe_JC.exe

  • Size

    1.5MB

  • MD5

    4b9a766d59fef5ef37a8e15935fb4ef4

  • SHA1

    11838d8176098d318f515f2e5af93bb83d04c3e5

  • SHA256

    4023c46f4952ba455975ea1e4ca84dc160881ade28418fa58e44b430f436fe8e

  • SHA512

    107c1c22e5c49cbb27311927efc6dc708d3a664abf5052c8cc3d3aac81e8209f46deb95e69b56da48498acad78dff7d94b3109eb4f3494271d0c29eab353440e

  • SSDEEP

    49152:bG+RzHigV1U84Ih8PKNWp/oG1XFKVDYjV:BRzHFE8phaKfG9FKVDu

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • .NET Reactor proctector 19 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 11 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.4023c46f4952ba455975ea1e4ca84dc160881ade28418fa58e44b430f436fe8eexe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.4023c46f4952ba455975ea1e4ca84dc160881ade28418fa58e44b430f436fe8eexe_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jt6Jp69.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jt6Jp69.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:916
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Nn4HK86.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Nn4HK86.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2948
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\DG4up14.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\DG4up14.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2748
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1JY76pr0.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1JY76pr0.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2568
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2gq6432.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2gq6432.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jt6Jp69.exe

    Filesize

    1.4MB

    MD5

    dd9be17d5c30ddbb5513854bca04ad2f

    SHA1

    a643899e55fa365ad3a5179b2f914bec32837b5e

    SHA256

    75feb79a185b136f3a24901da65d75e31efda21b6a8b07dd12a8ccd8c8edfcbb

    SHA512

    c5e12693ff2a500b300504aa643e548ded436866d4eca86e085f9d20d42aa49eb83c5e49f30e362332a9bd823530f11c50e1bbfd1409cf48acdfea830c102e64

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jt6Jp69.exe

    Filesize

    1.4MB

    MD5

    dd9be17d5c30ddbb5513854bca04ad2f

    SHA1

    a643899e55fa365ad3a5179b2f914bec32837b5e

    SHA256

    75feb79a185b136f3a24901da65d75e31efda21b6a8b07dd12a8ccd8c8edfcbb

    SHA512

    c5e12693ff2a500b300504aa643e548ded436866d4eca86e085f9d20d42aa49eb83c5e49f30e362332a9bd823530f11c50e1bbfd1409cf48acdfea830c102e64

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Nn4HK86.exe

    Filesize

    1006KB

    MD5

    0ae17e02e4a1fe5fd2a6f1820e250be5

    SHA1

    0d43e1678f9afdb776989759dccc9c02519f61ac

    SHA256

    bcade731c2860b834ecf30f4835b3443577259f92f65ab8fbd5bbe85743de64c

    SHA512

    15f9b80609c99bfa580ee13e56dd577bfd3dc7f40b868b84d73f5c425dc5f257d825826e098bbc9c2c45143620315409af96c10964782373a8985f17689cb257

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Nn4HK86.exe

    Filesize

    1006KB

    MD5

    0ae17e02e4a1fe5fd2a6f1820e250be5

    SHA1

    0d43e1678f9afdb776989759dccc9c02519f61ac

    SHA256

    bcade731c2860b834ecf30f4835b3443577259f92f65ab8fbd5bbe85743de64c

    SHA512

    15f9b80609c99bfa580ee13e56dd577bfd3dc7f40b868b84d73f5c425dc5f257d825826e098bbc9c2c45143620315409af96c10964782373a8985f17689cb257

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\DG4up14.exe

    Filesize

    621KB

    MD5

    14193953546b9ae4cb90868da5526998

    SHA1

    27c6593fe3dfd124776429bdff596af0009ca7e5

    SHA256

    6ee0d2032d33fcf802ad57f2750aaa9ba027505dd8e1c87559737b5783d16d62

    SHA512

    db2d0b90ee6ac456e4d25a5cef1f2b05d9ba09e328939b25dda758237dd9d5f15a0904ceabf6e1cf47df16454e11c07554618989a350b9bf39b8056940931cb5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\DG4up14.exe

    Filesize

    621KB

    MD5

    14193953546b9ae4cb90868da5526998

    SHA1

    27c6593fe3dfd124776429bdff596af0009ca7e5

    SHA256

    6ee0d2032d33fcf802ad57f2750aaa9ba027505dd8e1c87559737b5783d16d62

    SHA512

    db2d0b90ee6ac456e4d25a5cef1f2b05d9ba09e328939b25dda758237dd9d5f15a0904ceabf6e1cf47df16454e11c07554618989a350b9bf39b8056940931cb5

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1JY76pr0.exe

    Filesize

    195KB

    MD5

    7f726f7dac36a27880ea545866534dda

    SHA1

    a644a86f8ffe8497101eb2c8ef69b859fb51119d

    SHA256

    7d8062c6ae88e04ecadb6f8eb85e1d77caba2cb70fed241f04454fd5d70ced2a

    SHA512

    8d8216a173bf1b498e5bf6d9292b05cd27b913c3203e296d55b169a1980bc38d8589bdb3e88a685a238183a60b8e86049cf280dd47143445c1ba5b6d287c2775

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1JY76pr0.exe

    Filesize

    195KB

    MD5

    7f726f7dac36a27880ea545866534dda

    SHA1

    a644a86f8ffe8497101eb2c8ef69b859fb51119d

    SHA256

    7d8062c6ae88e04ecadb6f8eb85e1d77caba2cb70fed241f04454fd5d70ced2a

    SHA512

    8d8216a173bf1b498e5bf6d9292b05cd27b913c3203e296d55b169a1980bc38d8589bdb3e88a685a238183a60b8e86049cf280dd47143445c1ba5b6d287c2775

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2gq6432.exe

    Filesize

    1.1MB

    MD5

    a1c1c44e837edbc2d55d33ba9620a109

    SHA1

    0ba4e08d7b6f17f968d1f7cad75d0a3885bae998

    SHA256

    4160c00350706d7630b0a8bfb47722e7ec956858ab07d5adc9345e37ccb751e5

    SHA512

    75267e9d0652e006107506457c5253fe701149888ad977d95f52d215410b18e3b145c8779ae389b718f090c5aa41d614e45deb38a96852a07a299a5b075c02bc

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2gq6432.exe

    Filesize

    1.1MB

    MD5

    a1c1c44e837edbc2d55d33ba9620a109

    SHA1

    0ba4e08d7b6f17f968d1f7cad75d0a3885bae998

    SHA256

    4160c00350706d7630b0a8bfb47722e7ec956858ab07d5adc9345e37ccb751e5

    SHA512

    75267e9d0652e006107506457c5253fe701149888ad977d95f52d215410b18e3b145c8779ae389b718f090c5aa41d614e45deb38a96852a07a299a5b075c02bc

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2gq6432.exe

    Filesize

    1.1MB

    MD5

    a1c1c44e837edbc2d55d33ba9620a109

    SHA1

    0ba4e08d7b6f17f968d1f7cad75d0a3885bae998

    SHA256

    4160c00350706d7630b0a8bfb47722e7ec956858ab07d5adc9345e37ccb751e5

    SHA512

    75267e9d0652e006107506457c5253fe701149888ad977d95f52d215410b18e3b145c8779ae389b718f090c5aa41d614e45deb38a96852a07a299a5b075c02bc

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\jt6Jp69.exe

    Filesize

    1.4MB

    MD5

    dd9be17d5c30ddbb5513854bca04ad2f

    SHA1

    a643899e55fa365ad3a5179b2f914bec32837b5e

    SHA256

    75feb79a185b136f3a24901da65d75e31efda21b6a8b07dd12a8ccd8c8edfcbb

    SHA512

    c5e12693ff2a500b300504aa643e548ded436866d4eca86e085f9d20d42aa49eb83c5e49f30e362332a9bd823530f11c50e1bbfd1409cf48acdfea830c102e64

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\jt6Jp69.exe

    Filesize

    1.4MB

    MD5

    dd9be17d5c30ddbb5513854bca04ad2f

    SHA1

    a643899e55fa365ad3a5179b2f914bec32837b5e

    SHA256

    75feb79a185b136f3a24901da65d75e31efda21b6a8b07dd12a8ccd8c8edfcbb

    SHA512

    c5e12693ff2a500b300504aa643e548ded436866d4eca86e085f9d20d42aa49eb83c5e49f30e362332a9bd823530f11c50e1bbfd1409cf48acdfea830c102e64

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Nn4HK86.exe

    Filesize

    1006KB

    MD5

    0ae17e02e4a1fe5fd2a6f1820e250be5

    SHA1

    0d43e1678f9afdb776989759dccc9c02519f61ac

    SHA256

    bcade731c2860b834ecf30f4835b3443577259f92f65ab8fbd5bbe85743de64c

    SHA512

    15f9b80609c99bfa580ee13e56dd577bfd3dc7f40b868b84d73f5c425dc5f257d825826e098bbc9c2c45143620315409af96c10964782373a8985f17689cb257

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Nn4HK86.exe

    Filesize

    1006KB

    MD5

    0ae17e02e4a1fe5fd2a6f1820e250be5

    SHA1

    0d43e1678f9afdb776989759dccc9c02519f61ac

    SHA256

    bcade731c2860b834ecf30f4835b3443577259f92f65ab8fbd5bbe85743de64c

    SHA512

    15f9b80609c99bfa580ee13e56dd577bfd3dc7f40b868b84d73f5c425dc5f257d825826e098bbc9c2c45143620315409af96c10964782373a8985f17689cb257

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\DG4up14.exe

    Filesize

    621KB

    MD5

    14193953546b9ae4cb90868da5526998

    SHA1

    27c6593fe3dfd124776429bdff596af0009ca7e5

    SHA256

    6ee0d2032d33fcf802ad57f2750aaa9ba027505dd8e1c87559737b5783d16d62

    SHA512

    db2d0b90ee6ac456e4d25a5cef1f2b05d9ba09e328939b25dda758237dd9d5f15a0904ceabf6e1cf47df16454e11c07554618989a350b9bf39b8056940931cb5

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\DG4up14.exe

    Filesize

    621KB

    MD5

    14193953546b9ae4cb90868da5526998

    SHA1

    27c6593fe3dfd124776429bdff596af0009ca7e5

    SHA256

    6ee0d2032d33fcf802ad57f2750aaa9ba027505dd8e1c87559737b5783d16d62

    SHA512

    db2d0b90ee6ac456e4d25a5cef1f2b05d9ba09e328939b25dda758237dd9d5f15a0904ceabf6e1cf47df16454e11c07554618989a350b9bf39b8056940931cb5

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1JY76pr0.exe

    Filesize

    195KB

    MD5

    7f726f7dac36a27880ea545866534dda

    SHA1

    a644a86f8ffe8497101eb2c8ef69b859fb51119d

    SHA256

    7d8062c6ae88e04ecadb6f8eb85e1d77caba2cb70fed241f04454fd5d70ced2a

    SHA512

    8d8216a173bf1b498e5bf6d9292b05cd27b913c3203e296d55b169a1980bc38d8589bdb3e88a685a238183a60b8e86049cf280dd47143445c1ba5b6d287c2775

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1JY76pr0.exe

    Filesize

    195KB

    MD5

    7f726f7dac36a27880ea545866534dda

    SHA1

    a644a86f8ffe8497101eb2c8ef69b859fb51119d

    SHA256

    7d8062c6ae88e04ecadb6f8eb85e1d77caba2cb70fed241f04454fd5d70ced2a

    SHA512

    8d8216a173bf1b498e5bf6d9292b05cd27b913c3203e296d55b169a1980bc38d8589bdb3e88a685a238183a60b8e86049cf280dd47143445c1ba5b6d287c2775

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2gq6432.exe

    Filesize

    1.1MB

    MD5

    a1c1c44e837edbc2d55d33ba9620a109

    SHA1

    0ba4e08d7b6f17f968d1f7cad75d0a3885bae998

    SHA256

    4160c00350706d7630b0a8bfb47722e7ec956858ab07d5adc9345e37ccb751e5

    SHA512

    75267e9d0652e006107506457c5253fe701149888ad977d95f52d215410b18e3b145c8779ae389b718f090c5aa41d614e45deb38a96852a07a299a5b075c02bc

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2gq6432.exe

    Filesize

    1.1MB

    MD5

    a1c1c44e837edbc2d55d33ba9620a109

    SHA1

    0ba4e08d7b6f17f968d1f7cad75d0a3885bae998

    SHA256

    4160c00350706d7630b0a8bfb47722e7ec956858ab07d5adc9345e37ccb751e5

    SHA512

    75267e9d0652e006107506457c5253fe701149888ad977d95f52d215410b18e3b145c8779ae389b718f090c5aa41d614e45deb38a96852a07a299a5b075c02bc

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2gq6432.exe

    Filesize

    1.1MB

    MD5

    a1c1c44e837edbc2d55d33ba9620a109

    SHA1

    0ba4e08d7b6f17f968d1f7cad75d0a3885bae998

    SHA256

    4160c00350706d7630b0a8bfb47722e7ec956858ab07d5adc9345e37ccb751e5

    SHA512

    75267e9d0652e006107506457c5253fe701149888ad977d95f52d215410b18e3b145c8779ae389b718f090c5aa41d614e45deb38a96852a07a299a5b075c02bc

  • memory/2568-45-0x00000000004E0000-0x00000000004F8000-memory.dmp

    Filesize

    96KB

  • memory/2568-51-0x00000000004E0000-0x00000000004F8000-memory.dmp

    Filesize

    96KB

  • memory/2568-53-0x00000000004E0000-0x00000000004F8000-memory.dmp

    Filesize

    96KB

  • memory/2568-55-0x00000000004E0000-0x00000000004F8000-memory.dmp

    Filesize

    96KB

  • memory/2568-59-0x00000000004E0000-0x00000000004F8000-memory.dmp

    Filesize

    96KB

  • memory/2568-57-0x00000000004E0000-0x00000000004F8000-memory.dmp

    Filesize

    96KB

  • memory/2568-61-0x00000000004E0000-0x00000000004F8000-memory.dmp

    Filesize

    96KB

  • memory/2568-69-0x00000000004E0000-0x00000000004F8000-memory.dmp

    Filesize

    96KB

  • memory/2568-67-0x00000000004E0000-0x00000000004F8000-memory.dmp

    Filesize

    96KB

  • memory/2568-71-0x00000000004E0000-0x00000000004F8000-memory.dmp

    Filesize

    96KB

  • memory/2568-65-0x00000000004E0000-0x00000000004F8000-memory.dmp

    Filesize

    96KB

  • memory/2568-73-0x00000000004E0000-0x00000000004F8000-memory.dmp

    Filesize

    96KB

  • memory/2568-63-0x00000000004E0000-0x00000000004F8000-memory.dmp

    Filesize

    96KB

  • memory/2568-49-0x00000000004E0000-0x00000000004F8000-memory.dmp

    Filesize

    96KB

  • memory/2568-47-0x00000000004E0000-0x00000000004F8000-memory.dmp

    Filesize

    96KB

  • memory/2568-42-0x00000000004E0000-0x00000000004F8000-memory.dmp

    Filesize

    96KB

  • memory/2568-43-0x00000000004E0000-0x00000000004F8000-memory.dmp

    Filesize

    96KB

  • memory/2568-41-0x00000000004E0000-0x00000000004FE000-memory.dmp

    Filesize

    120KB

  • memory/2568-40-0x00000000003D0000-0x00000000003F0000-memory.dmp

    Filesize

    128KB