Analysis
-
max time kernel
143s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 09:48
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.5df99401e3c2e9a0bb505674bf172273_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.5df99401e3c2e9a0bb505674bf172273_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.5df99401e3c2e9a0bb505674bf172273_JC.exe
-
Size
129KB
-
MD5
5df99401e3c2e9a0bb505674bf172273
-
SHA1
13e6eeef2a745ad36c31e6192057a8a807c5bdc0
-
SHA256
1f60ba73b822f9348e2e87d80f4395b923dd24a82b3b16da28ecaaf1c09e3def
-
SHA512
6d36198b604ae2f262905eaab1ba3b3c1bc380e569886c2b22515f12a0497de826243913639dd4826cc72b91d46618f099530a539d21ad528aedac537e2c8504
-
SSDEEP
3072:WGEOuXwuyvvM/DegVMzB7Nt1oPFZlM0htmkj7yq3Y3u4Vpw:WFwPvvMbeGM932PvlM0hVeON4s
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\web.exe NEAS.5df99401e3c2e9a0bb505674bf172273_JC.exe File opened for modification C:\Windows\SysWOW64\web.exe NEAS.5df99401e3c2e9a0bb505674bf172273_JC.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Debug\web32.dll NEAS.5df99401e3c2e9a0bb505674bf172273_JC.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F49C475D-5651-4A94-B289-9953F9248EF9} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F49C475D-5651-4A94-B289-9953F9248EF9}\ = "url" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F49C475D-5651-4A94-B289-9953F9248EF9}\InProcServer32 regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F49C475D-5651-4A94-B289-9953F9248EF9}\InProcServer32\ = "C:\\Windows\\Debug\\web32.dll" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F49C475D-5651-4A94-B289-9953F9248EF9}\InProcServer32\ThreadingModel = "Apartment" regedit.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1488 regedit.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5100 wrote to memory of 464 5100 NEAS.5df99401e3c2e9a0bb505674bf172273_JC.exe 88 PID 5100 wrote to memory of 464 5100 NEAS.5df99401e3c2e9a0bb505674bf172273_JC.exe 88 PID 5100 wrote to memory of 464 5100 NEAS.5df99401e3c2e9a0bb505674bf172273_JC.exe 88 PID 5100 wrote to memory of 4792 5100 NEAS.5df99401e3c2e9a0bb505674bf172273_JC.exe 90 PID 5100 wrote to memory of 4792 5100 NEAS.5df99401e3c2e9a0bb505674bf172273_JC.exe 90 PID 5100 wrote to memory of 4792 5100 NEAS.5df99401e3c2e9a0bb505674bf172273_JC.exe 90 PID 464 wrote to memory of 1488 464 cmd.exe 92 PID 464 wrote to memory of 1488 464 cmd.exe 92 PID 464 wrote to memory of 1488 464 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5df99401e3c2e9a0bb505674bf172273_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5df99401e3c2e9a0bb505674bf172273_JC.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\run1.bat2⤵
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\SysWOW64\regedit.exeregedit /s C:\Users\Admin\AppData\Local\Temp\s1.reg3⤵
- Modifies registry class
- Runs .reg file with regedit
PID:1488
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c erase /F "C:\Users\Admin\AppData\Local\Temp\NEAS.5df99401e3c2e9a0bb505674bf172273_JC.exe"2⤵PID:4792
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118B
MD5c9ca0afd6c6d4ba684394ab5ee38482c
SHA1218342e5aa6ad25831f0f4991dd45cc822940206
SHA256fb1820a50d3feaa20d5c43c92ce107c025d80549a0337b272df8c9f5ce89c25c
SHA5123c8228a0cada2ef3a4c8fba626afd0bb5f518413243f0473842ae16a96a72e8b96229026413721c9472908945a6198ee6aa260f6c7516b984b3f7de6889a0495
-
Filesize
401B
MD55e32fb9a736a8c57fc91d686f47933a0
SHA1af36957427a7941e76706171e5943fdf5e8345e6
SHA2561691cac4fc9de53de098f525ff02f9a01cabbc952f00eed8c533f62190ef8ba4
SHA51296e4734944bbee46e7b3b3ca5bb692482df6ce91fbf764828d1304d1133ee7e3dc6c63cb3d5bd4e7a59adbc9a23af438490db5827cfb0438a3aa8eaf91a2546e