Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 10:31
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.06984e3d54fb6818b436748229b5d040_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.06984e3d54fb6818b436748229b5d040_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.06984e3d54fb6818b436748229b5d040_JC.exe
-
Size
89KB
-
MD5
06984e3d54fb6818b436748229b5d040
-
SHA1
01353b4f51275e8c20ad158cb5acd4512a5de08a
-
SHA256
2ce01d2abf37e25bcec5334d26b89428249737753a8af514efae9e4b40650052
-
SHA512
dfb155e99da5371fba9dac4256ea0355547f77092190b64fe93d8092e35d65d021dc08e6897d8b9c9b0d9dbac8db29e38272e0a8b0cd63e123d3c57d45b657ef
-
SSDEEP
768:JgO5xRYi+SQvvG5bnl/NqNwsKVDsBYD77aXKynF0vq:eshQvoLqNwDDhCeq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2052 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command NEAS.06984e3d54fb6818b436748229b5d040_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" NEAS.06984e3d54fb6818b436748229b5d040_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" NEAS.06984e3d54fb6818b436748229b5d040_JC.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe NEAS.06984e3d54fb6818b436748229b5d040_JC.exe File created C:\Windows\SysWOW64\¢«.exe NEAS.06984e3d54fb6818b436748229b5d040_JC.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe NEAS.06984e3d54fb6818b436748229b5d040_JC.exe File created C:\Windows\SysWOW64\notepad¢¬.exe NEAS.06984e3d54fb6818b436748229b5d040_JC.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe NEAS.06984e3d54fb6818b436748229b5d040_JC.exe File created C:\Windows\system\rundll32.exe NEAS.06984e3d54fb6818b436748229b5d040_JC.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2308 2052 WerFault.exe 87 -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv NEAS.06984e3d54fb6818b436748229b5d040_JC.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command NEAS.06984e3d54fb6818b436748229b5d040_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" NEAS.06984e3d54fb6818b436748229b5d040_JC.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" NEAS.06984e3d54fb6818b436748229b5d040_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" NEAS.06984e3d54fb6818b436748229b5d040_JC.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command NEAS.06984e3d54fb6818b436748229b5d040_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" NEAS.06984e3d54fb6818b436748229b5d040_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1697323784" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1697323784" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 2052 rundll32.exe 2052 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2052 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 87 PID 1908 wrote to memory of 2052 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 87 PID 1908 wrote to memory of 2052 1908 NEAS.06984e3d54fb6818b436748229b5d040_JC.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.06984e3d54fb6818b436748229b5d040_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.06984e3d54fb6818b436748229b5d040_JC.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2052 -s 15603⤵
- Program crash
PID:2308
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2052 -ip 20521⤵PID:412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD56de2488e1d9b5ba16d3b21d02cba1df2
SHA1cda6847f282d72e55b7b3f354839c4ecc97f3f35
SHA25684f8f43775990516df20aaa48bd13644946e9ebca45404ebde8885337e9f7427
SHA512e69186b6023ddd41c8f211d59ef610519b69341c9d2bc417d9fa5d32f87d77d72afe340542cea36e182e0bac197ce30fbbdef9dedbff954b397e6d2f99509435
-
Filesize
89KB
MD52fd58b1c5a9e81d21c8bbeb956130e06
SHA1aa24b2839843a1bdfb75ae5d0f3854d3a8c2b8b2
SHA25646fdaf016c43824774b904605c3c52ac3e1382218c99b63ccd17176aa980b50b
SHA5120b3a4a009d2b15bf14e5a8343a03a45a8a0f599ccf5fb3891b4af41d16e1dc866065f634001bb950659124db1259f776894d8e26477ab7828db7c15b8f8822cf
-
Filesize
89KB
MD52fd58b1c5a9e81d21c8bbeb956130e06
SHA1aa24b2839843a1bdfb75ae5d0f3854d3a8c2b8b2
SHA25646fdaf016c43824774b904605c3c52ac3e1382218c99b63ccd17176aa980b50b
SHA5120b3a4a009d2b15bf14e5a8343a03a45a8a0f599ccf5fb3891b4af41d16e1dc866065f634001bb950659124db1259f776894d8e26477ab7828db7c15b8f8822cf