Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 09:46
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.02c96bf20a312e7d35d90d7984d36f30_JC.exe
Resource
win7-20230831-en
General
-
Target
NEAS.02c96bf20a312e7d35d90d7984d36f30_JC.exe
-
Size
389KB
-
MD5
02c96bf20a312e7d35d90d7984d36f30
-
SHA1
a0b90d58bc836cdd645e118c6604c839027895d6
-
SHA256
1c78d2af688f621731917371ec2861b048b90fca89a0f5e5af0684e3d7e319ab
-
SHA512
50f055ced1150abaf728e33b5acfcb6e799372d6257e14612c1183b2959c4e0849e2a4fc9411f8184de1362ac97e61811af3117eaf7f136aa39b3bc3c1808475
-
SSDEEP
6144:LFeoDed5eYd1pu2rZGtakfnM/FRrFgjObxm9AZGSDL8oUY6p02j:phDed5ld9J//HqjDaDL/UY6xj
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2056 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2708 server.exe -
Loads dropped DLL 1 IoCs
pid Process 3048 NEAS.02c96bf20a312e7d35d90d7984d36f30_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeDebugPrivilege 2708 server.exe Token: 33 2708 server.exe Token: SeIncBasePriorityPrivilege 2708 server.exe Token: 33 2708 server.exe Token: SeIncBasePriorityPrivilege 2708 server.exe Token: 33 2708 server.exe Token: SeIncBasePriorityPrivilege 2708 server.exe Token: 33 2708 server.exe Token: SeIncBasePriorityPrivilege 2708 server.exe Token: 33 2708 server.exe Token: SeIncBasePriorityPrivilege 2708 server.exe Token: 33 2708 server.exe Token: SeIncBasePriorityPrivilege 2708 server.exe Token: 33 2708 server.exe Token: SeIncBasePriorityPrivilege 2708 server.exe Token: 33 2708 server.exe Token: SeIncBasePriorityPrivilege 2708 server.exe Token: 33 2708 server.exe Token: SeIncBasePriorityPrivilege 2708 server.exe Token: 33 2708 server.exe Token: SeIncBasePriorityPrivilege 2708 server.exe Token: 33 2708 server.exe Token: SeIncBasePriorityPrivilege 2708 server.exe Token: 33 2708 server.exe Token: SeIncBasePriorityPrivilege 2708 server.exe Token: 33 2708 server.exe Token: SeIncBasePriorityPrivilege 2708 server.exe Token: 33 2708 server.exe Token: SeIncBasePriorityPrivilege 2708 server.exe Token: 33 2708 server.exe Token: SeIncBasePriorityPrivilege 2708 server.exe Token: 33 2708 server.exe Token: SeIncBasePriorityPrivilege 2708 server.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2708 3048 NEAS.02c96bf20a312e7d35d90d7984d36f30_JC.exe 28 PID 3048 wrote to memory of 2708 3048 NEAS.02c96bf20a312e7d35d90d7984d36f30_JC.exe 28 PID 3048 wrote to memory of 2708 3048 NEAS.02c96bf20a312e7d35d90d7984d36f30_JC.exe 28 PID 3048 wrote to memory of 2708 3048 NEAS.02c96bf20a312e7d35d90d7984d36f30_JC.exe 28 PID 2708 wrote to memory of 2056 2708 server.exe 29 PID 2708 wrote to memory of 2056 2708 server.exe 29 PID 2708 wrote to memory of 2056 2708 server.exe 29 PID 2708 wrote to memory of 2056 2708 server.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.02c96bf20a312e7d35d90d7984d36f30_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.02c96bf20a312e7d35d90d7984d36f30_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:2056
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
389KB
MD502c96bf20a312e7d35d90d7984d36f30
SHA1a0b90d58bc836cdd645e118c6604c839027895d6
SHA2561c78d2af688f621731917371ec2861b048b90fca89a0f5e5af0684e3d7e319ab
SHA51250f055ced1150abaf728e33b5acfcb6e799372d6257e14612c1183b2959c4e0849e2a4fc9411f8184de1362ac97e61811af3117eaf7f136aa39b3bc3c1808475
-
Filesize
389KB
MD502c96bf20a312e7d35d90d7984d36f30
SHA1a0b90d58bc836cdd645e118c6604c839027895d6
SHA2561c78d2af688f621731917371ec2861b048b90fca89a0f5e5af0684e3d7e319ab
SHA51250f055ced1150abaf728e33b5acfcb6e799372d6257e14612c1183b2959c4e0849e2a4fc9411f8184de1362ac97e61811af3117eaf7f136aa39b3bc3c1808475
-
Filesize
389KB
MD502c96bf20a312e7d35d90d7984d36f30
SHA1a0b90d58bc836cdd645e118c6604c839027895d6
SHA2561c78d2af688f621731917371ec2861b048b90fca89a0f5e5af0684e3d7e319ab
SHA51250f055ced1150abaf728e33b5acfcb6e799372d6257e14612c1183b2959c4e0849e2a4fc9411f8184de1362ac97e61811af3117eaf7f136aa39b3bc3c1808475