Analysis
-
max time kernel
157s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 09:25
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.4023c46f4952ba455975ea1e4ca84dc160881ade28418fa58e44b430f436fe8eexe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.4023c46f4952ba455975ea1e4ca84dc160881ade28418fa58e44b430f436fe8eexe_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.4023c46f4952ba455975ea1e4ca84dc160881ade28418fa58e44b430f436fe8eexe_JC.exe
-
Size
1.5MB
-
MD5
4b9a766d59fef5ef37a8e15935fb4ef4
-
SHA1
11838d8176098d318f515f2e5af93bb83d04c3e5
-
SHA256
4023c46f4952ba455975ea1e4ca84dc160881ade28418fa58e44b430f436fe8e
-
SHA512
107c1c22e5c49cbb27311927efc6dc708d3a664abf5052c8cc3d3aac81e8209f46deb95e69b56da48498acad78dff7d94b3109eb4f3494271d0c29eab353440e
-
SSDEEP
49152:bG+RzHigV1U84Ih8PKNWp/oG1XFKVDYjV:BRzHFE8phaKfG9FKVDu
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1JY76pr0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1JY76pr0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1JY76pr0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1JY76pr0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1JY76pr0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1JY76pr0.exe -
.NET Reactor proctector 19 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/2568-40-0x00000000003D0000-0x00000000003F0000-memory.dmp net_reactor behavioral1/memory/2568-41-0x00000000004E0000-0x00000000004FE000-memory.dmp net_reactor behavioral1/memory/2568-43-0x00000000004E0000-0x00000000004F8000-memory.dmp net_reactor behavioral1/memory/2568-42-0x00000000004E0000-0x00000000004F8000-memory.dmp net_reactor behavioral1/memory/2568-45-0x00000000004E0000-0x00000000004F8000-memory.dmp net_reactor behavioral1/memory/2568-47-0x00000000004E0000-0x00000000004F8000-memory.dmp net_reactor behavioral1/memory/2568-49-0x00000000004E0000-0x00000000004F8000-memory.dmp net_reactor behavioral1/memory/2568-51-0x00000000004E0000-0x00000000004F8000-memory.dmp net_reactor behavioral1/memory/2568-53-0x00000000004E0000-0x00000000004F8000-memory.dmp net_reactor behavioral1/memory/2568-55-0x00000000004E0000-0x00000000004F8000-memory.dmp net_reactor behavioral1/memory/2568-59-0x00000000004E0000-0x00000000004F8000-memory.dmp net_reactor behavioral1/memory/2568-57-0x00000000004E0000-0x00000000004F8000-memory.dmp net_reactor behavioral1/memory/2568-61-0x00000000004E0000-0x00000000004F8000-memory.dmp net_reactor behavioral1/memory/2568-69-0x00000000004E0000-0x00000000004F8000-memory.dmp net_reactor behavioral1/memory/2568-67-0x00000000004E0000-0x00000000004F8000-memory.dmp net_reactor behavioral1/memory/2568-71-0x00000000004E0000-0x00000000004F8000-memory.dmp net_reactor behavioral1/memory/2568-65-0x00000000004E0000-0x00000000004F8000-memory.dmp net_reactor behavioral1/memory/2568-73-0x00000000004E0000-0x00000000004F8000-memory.dmp net_reactor behavioral1/memory/2568-63-0x00000000004E0000-0x00000000004F8000-memory.dmp net_reactor -
Executes dropped EXE 5 IoCs
pid Process 916 jt6Jp69.exe 2948 Nn4HK86.exe 2748 DG4up14.exe 2568 1JY76pr0.exe 2492 2gq6432.exe -
Loads dropped DLL 11 IoCs
pid Process 2324 NEAS.4023c46f4952ba455975ea1e4ca84dc160881ade28418fa58e44b430f436fe8eexe_JC.exe 916 jt6Jp69.exe 916 jt6Jp69.exe 2948 Nn4HK86.exe 2948 Nn4HK86.exe 2748 DG4up14.exe 2748 DG4up14.exe 2568 1JY76pr0.exe 2748 DG4up14.exe 2748 DG4up14.exe 2492 2gq6432.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 1JY76pr0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1JY76pr0.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.4023c46f4952ba455975ea1e4ca84dc160881ade28418fa58e44b430f436fe8eexe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" jt6Jp69.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Nn4HK86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" DG4up14.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2568 1JY76pr0.exe 2568 1JY76pr0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2568 1JY76pr0.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2324 wrote to memory of 916 2324 NEAS.4023c46f4952ba455975ea1e4ca84dc160881ade28418fa58e44b430f436fe8eexe_JC.exe 29 PID 2324 wrote to memory of 916 2324 NEAS.4023c46f4952ba455975ea1e4ca84dc160881ade28418fa58e44b430f436fe8eexe_JC.exe 29 PID 2324 wrote to memory of 916 2324 NEAS.4023c46f4952ba455975ea1e4ca84dc160881ade28418fa58e44b430f436fe8eexe_JC.exe 29 PID 2324 wrote to memory of 916 2324 NEAS.4023c46f4952ba455975ea1e4ca84dc160881ade28418fa58e44b430f436fe8eexe_JC.exe 29 PID 2324 wrote to memory of 916 2324 NEAS.4023c46f4952ba455975ea1e4ca84dc160881ade28418fa58e44b430f436fe8eexe_JC.exe 29 PID 2324 wrote to memory of 916 2324 NEAS.4023c46f4952ba455975ea1e4ca84dc160881ade28418fa58e44b430f436fe8eexe_JC.exe 29 PID 2324 wrote to memory of 916 2324 NEAS.4023c46f4952ba455975ea1e4ca84dc160881ade28418fa58e44b430f436fe8eexe_JC.exe 29 PID 916 wrote to memory of 2948 916 jt6Jp69.exe 30 PID 916 wrote to memory of 2948 916 jt6Jp69.exe 30 PID 916 wrote to memory of 2948 916 jt6Jp69.exe 30 PID 916 wrote to memory of 2948 916 jt6Jp69.exe 30 PID 916 wrote to memory of 2948 916 jt6Jp69.exe 30 PID 916 wrote to memory of 2948 916 jt6Jp69.exe 30 PID 916 wrote to memory of 2948 916 jt6Jp69.exe 30 PID 2948 wrote to memory of 2748 2948 Nn4HK86.exe 31 PID 2948 wrote to memory of 2748 2948 Nn4HK86.exe 31 PID 2948 wrote to memory of 2748 2948 Nn4HK86.exe 31 PID 2948 wrote to memory of 2748 2948 Nn4HK86.exe 31 PID 2948 wrote to memory of 2748 2948 Nn4HK86.exe 31 PID 2948 wrote to memory of 2748 2948 Nn4HK86.exe 31 PID 2948 wrote to memory of 2748 2948 Nn4HK86.exe 31 PID 2748 wrote to memory of 2568 2748 DG4up14.exe 32 PID 2748 wrote to memory of 2568 2748 DG4up14.exe 32 PID 2748 wrote to memory of 2568 2748 DG4up14.exe 32 PID 2748 wrote to memory of 2568 2748 DG4up14.exe 32 PID 2748 wrote to memory of 2568 2748 DG4up14.exe 32 PID 2748 wrote to memory of 2568 2748 DG4up14.exe 32 PID 2748 wrote to memory of 2568 2748 DG4up14.exe 32 PID 2748 wrote to memory of 2492 2748 DG4up14.exe 33 PID 2748 wrote to memory of 2492 2748 DG4up14.exe 33 PID 2748 wrote to memory of 2492 2748 DG4up14.exe 33 PID 2748 wrote to memory of 2492 2748 DG4up14.exe 33 PID 2748 wrote to memory of 2492 2748 DG4up14.exe 33 PID 2748 wrote to memory of 2492 2748 DG4up14.exe 33 PID 2748 wrote to memory of 2492 2748 DG4up14.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.4023c46f4952ba455975ea1e4ca84dc160881ade28418fa58e44b430f436fe8eexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.4023c46f4952ba455975ea1e4ca84dc160881ade28418fa58e44b430f436fe8eexe_JC.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jt6Jp69.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jt6Jp69.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Nn4HK86.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Nn4HK86.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\DG4up14.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\DG4up14.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1JY76pr0.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1JY76pr0.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2gq6432.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2gq6432.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2492
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5dd9be17d5c30ddbb5513854bca04ad2f
SHA1a643899e55fa365ad3a5179b2f914bec32837b5e
SHA25675feb79a185b136f3a24901da65d75e31efda21b6a8b07dd12a8ccd8c8edfcbb
SHA512c5e12693ff2a500b300504aa643e548ded436866d4eca86e085f9d20d42aa49eb83c5e49f30e362332a9bd823530f11c50e1bbfd1409cf48acdfea830c102e64
-
Filesize
1.4MB
MD5dd9be17d5c30ddbb5513854bca04ad2f
SHA1a643899e55fa365ad3a5179b2f914bec32837b5e
SHA25675feb79a185b136f3a24901da65d75e31efda21b6a8b07dd12a8ccd8c8edfcbb
SHA512c5e12693ff2a500b300504aa643e548ded436866d4eca86e085f9d20d42aa49eb83c5e49f30e362332a9bd823530f11c50e1bbfd1409cf48acdfea830c102e64
-
Filesize
1006KB
MD50ae17e02e4a1fe5fd2a6f1820e250be5
SHA10d43e1678f9afdb776989759dccc9c02519f61ac
SHA256bcade731c2860b834ecf30f4835b3443577259f92f65ab8fbd5bbe85743de64c
SHA51215f9b80609c99bfa580ee13e56dd577bfd3dc7f40b868b84d73f5c425dc5f257d825826e098bbc9c2c45143620315409af96c10964782373a8985f17689cb257
-
Filesize
1006KB
MD50ae17e02e4a1fe5fd2a6f1820e250be5
SHA10d43e1678f9afdb776989759dccc9c02519f61ac
SHA256bcade731c2860b834ecf30f4835b3443577259f92f65ab8fbd5bbe85743de64c
SHA51215f9b80609c99bfa580ee13e56dd577bfd3dc7f40b868b84d73f5c425dc5f257d825826e098bbc9c2c45143620315409af96c10964782373a8985f17689cb257
-
Filesize
621KB
MD514193953546b9ae4cb90868da5526998
SHA127c6593fe3dfd124776429bdff596af0009ca7e5
SHA2566ee0d2032d33fcf802ad57f2750aaa9ba027505dd8e1c87559737b5783d16d62
SHA512db2d0b90ee6ac456e4d25a5cef1f2b05d9ba09e328939b25dda758237dd9d5f15a0904ceabf6e1cf47df16454e11c07554618989a350b9bf39b8056940931cb5
-
Filesize
621KB
MD514193953546b9ae4cb90868da5526998
SHA127c6593fe3dfd124776429bdff596af0009ca7e5
SHA2566ee0d2032d33fcf802ad57f2750aaa9ba027505dd8e1c87559737b5783d16d62
SHA512db2d0b90ee6ac456e4d25a5cef1f2b05d9ba09e328939b25dda758237dd9d5f15a0904ceabf6e1cf47df16454e11c07554618989a350b9bf39b8056940931cb5
-
Filesize
195KB
MD57f726f7dac36a27880ea545866534dda
SHA1a644a86f8ffe8497101eb2c8ef69b859fb51119d
SHA2567d8062c6ae88e04ecadb6f8eb85e1d77caba2cb70fed241f04454fd5d70ced2a
SHA5128d8216a173bf1b498e5bf6d9292b05cd27b913c3203e296d55b169a1980bc38d8589bdb3e88a685a238183a60b8e86049cf280dd47143445c1ba5b6d287c2775
-
Filesize
195KB
MD57f726f7dac36a27880ea545866534dda
SHA1a644a86f8ffe8497101eb2c8ef69b859fb51119d
SHA2567d8062c6ae88e04ecadb6f8eb85e1d77caba2cb70fed241f04454fd5d70ced2a
SHA5128d8216a173bf1b498e5bf6d9292b05cd27b913c3203e296d55b169a1980bc38d8589bdb3e88a685a238183a60b8e86049cf280dd47143445c1ba5b6d287c2775
-
Filesize
1.1MB
MD5a1c1c44e837edbc2d55d33ba9620a109
SHA10ba4e08d7b6f17f968d1f7cad75d0a3885bae998
SHA2564160c00350706d7630b0a8bfb47722e7ec956858ab07d5adc9345e37ccb751e5
SHA51275267e9d0652e006107506457c5253fe701149888ad977d95f52d215410b18e3b145c8779ae389b718f090c5aa41d614e45deb38a96852a07a299a5b075c02bc
-
Filesize
1.1MB
MD5a1c1c44e837edbc2d55d33ba9620a109
SHA10ba4e08d7b6f17f968d1f7cad75d0a3885bae998
SHA2564160c00350706d7630b0a8bfb47722e7ec956858ab07d5adc9345e37ccb751e5
SHA51275267e9d0652e006107506457c5253fe701149888ad977d95f52d215410b18e3b145c8779ae389b718f090c5aa41d614e45deb38a96852a07a299a5b075c02bc
-
Filesize
1.1MB
MD5a1c1c44e837edbc2d55d33ba9620a109
SHA10ba4e08d7b6f17f968d1f7cad75d0a3885bae998
SHA2564160c00350706d7630b0a8bfb47722e7ec956858ab07d5adc9345e37ccb751e5
SHA51275267e9d0652e006107506457c5253fe701149888ad977d95f52d215410b18e3b145c8779ae389b718f090c5aa41d614e45deb38a96852a07a299a5b075c02bc
-
Filesize
1.4MB
MD5dd9be17d5c30ddbb5513854bca04ad2f
SHA1a643899e55fa365ad3a5179b2f914bec32837b5e
SHA25675feb79a185b136f3a24901da65d75e31efda21b6a8b07dd12a8ccd8c8edfcbb
SHA512c5e12693ff2a500b300504aa643e548ded436866d4eca86e085f9d20d42aa49eb83c5e49f30e362332a9bd823530f11c50e1bbfd1409cf48acdfea830c102e64
-
Filesize
1.4MB
MD5dd9be17d5c30ddbb5513854bca04ad2f
SHA1a643899e55fa365ad3a5179b2f914bec32837b5e
SHA25675feb79a185b136f3a24901da65d75e31efda21b6a8b07dd12a8ccd8c8edfcbb
SHA512c5e12693ff2a500b300504aa643e548ded436866d4eca86e085f9d20d42aa49eb83c5e49f30e362332a9bd823530f11c50e1bbfd1409cf48acdfea830c102e64
-
Filesize
1006KB
MD50ae17e02e4a1fe5fd2a6f1820e250be5
SHA10d43e1678f9afdb776989759dccc9c02519f61ac
SHA256bcade731c2860b834ecf30f4835b3443577259f92f65ab8fbd5bbe85743de64c
SHA51215f9b80609c99bfa580ee13e56dd577bfd3dc7f40b868b84d73f5c425dc5f257d825826e098bbc9c2c45143620315409af96c10964782373a8985f17689cb257
-
Filesize
1006KB
MD50ae17e02e4a1fe5fd2a6f1820e250be5
SHA10d43e1678f9afdb776989759dccc9c02519f61ac
SHA256bcade731c2860b834ecf30f4835b3443577259f92f65ab8fbd5bbe85743de64c
SHA51215f9b80609c99bfa580ee13e56dd577bfd3dc7f40b868b84d73f5c425dc5f257d825826e098bbc9c2c45143620315409af96c10964782373a8985f17689cb257
-
Filesize
621KB
MD514193953546b9ae4cb90868da5526998
SHA127c6593fe3dfd124776429bdff596af0009ca7e5
SHA2566ee0d2032d33fcf802ad57f2750aaa9ba027505dd8e1c87559737b5783d16d62
SHA512db2d0b90ee6ac456e4d25a5cef1f2b05d9ba09e328939b25dda758237dd9d5f15a0904ceabf6e1cf47df16454e11c07554618989a350b9bf39b8056940931cb5
-
Filesize
621KB
MD514193953546b9ae4cb90868da5526998
SHA127c6593fe3dfd124776429bdff596af0009ca7e5
SHA2566ee0d2032d33fcf802ad57f2750aaa9ba027505dd8e1c87559737b5783d16d62
SHA512db2d0b90ee6ac456e4d25a5cef1f2b05d9ba09e328939b25dda758237dd9d5f15a0904ceabf6e1cf47df16454e11c07554618989a350b9bf39b8056940931cb5
-
Filesize
195KB
MD57f726f7dac36a27880ea545866534dda
SHA1a644a86f8ffe8497101eb2c8ef69b859fb51119d
SHA2567d8062c6ae88e04ecadb6f8eb85e1d77caba2cb70fed241f04454fd5d70ced2a
SHA5128d8216a173bf1b498e5bf6d9292b05cd27b913c3203e296d55b169a1980bc38d8589bdb3e88a685a238183a60b8e86049cf280dd47143445c1ba5b6d287c2775
-
Filesize
195KB
MD57f726f7dac36a27880ea545866534dda
SHA1a644a86f8ffe8497101eb2c8ef69b859fb51119d
SHA2567d8062c6ae88e04ecadb6f8eb85e1d77caba2cb70fed241f04454fd5d70ced2a
SHA5128d8216a173bf1b498e5bf6d9292b05cd27b913c3203e296d55b169a1980bc38d8589bdb3e88a685a238183a60b8e86049cf280dd47143445c1ba5b6d287c2775
-
Filesize
1.1MB
MD5a1c1c44e837edbc2d55d33ba9620a109
SHA10ba4e08d7b6f17f968d1f7cad75d0a3885bae998
SHA2564160c00350706d7630b0a8bfb47722e7ec956858ab07d5adc9345e37ccb751e5
SHA51275267e9d0652e006107506457c5253fe701149888ad977d95f52d215410b18e3b145c8779ae389b718f090c5aa41d614e45deb38a96852a07a299a5b075c02bc
-
Filesize
1.1MB
MD5a1c1c44e837edbc2d55d33ba9620a109
SHA10ba4e08d7b6f17f968d1f7cad75d0a3885bae998
SHA2564160c00350706d7630b0a8bfb47722e7ec956858ab07d5adc9345e37ccb751e5
SHA51275267e9d0652e006107506457c5253fe701149888ad977d95f52d215410b18e3b145c8779ae389b718f090c5aa41d614e45deb38a96852a07a299a5b075c02bc
-
Filesize
1.1MB
MD5a1c1c44e837edbc2d55d33ba9620a109
SHA10ba4e08d7b6f17f968d1f7cad75d0a3885bae998
SHA2564160c00350706d7630b0a8bfb47722e7ec956858ab07d5adc9345e37ccb751e5
SHA51275267e9d0652e006107506457c5253fe701149888ad977d95f52d215410b18e3b145c8779ae389b718f090c5aa41d614e45deb38a96852a07a299a5b075c02bc