Analysis

  • max time kernel
    144s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-10-2023 10:38

General

  • Target

    NEAS.06ebdb1d6dd3443a047b2464ec3113c0_JC.exe

  • Size

    397KB

  • MD5

    06ebdb1d6dd3443a047b2464ec3113c0

  • SHA1

    7e78c10c9928269465e835bedfd5dffa1e3d5496

  • SHA256

    2647511cca8c80dbfa29b8d5a621d1cb386af8290b38f27f0010f2f662ff90c4

  • SHA512

    d974deb6818525228516f46e674f8b136d32673fd35bf21e37d9ce3ce1e5260cea156caf3a77c9ec981090437347081073eac0664559726b46668d729e6eac8b

  • SSDEEP

    6144:kTjR5PrKF1qNFed5Sp8uq6zout2+/gG0QRXDxHG7fndmOv:kvRhCSp8uJouw+E8XDxm7fnv

Score
1/10

Malware Config

Signatures

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.06ebdb1d6dd3443a047b2464ec3113c0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.06ebdb1d6dd3443a047b2464ec3113c0_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4176
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\NEAS.06ebdb1d6dd3443a047b2464ec3113c0_JC.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2356
      • C:\Windows\SysWOW64\PING.EXE
        ping 1.1.1.1 -n 1 -w 3000
        3⤵
        • Runs ping.exe
        PID:384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4176-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/4176-1-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/4176-2-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/4176-6-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/4176-8-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB