Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 12:25
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0f1bd6117e909bd57dfadb3cb6548350_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.0f1bd6117e909bd57dfadb3cb6548350_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.0f1bd6117e909bd57dfadb3cb6548350_JC.exe
-
Size
549KB
-
MD5
0f1bd6117e909bd57dfadb3cb6548350
-
SHA1
a2ed73c1b5446c372c70718eed58e61de1addcdb
-
SHA256
0286ac684a2a657681baff90fd6ac78563917d1d98728273e0acc49a60e14dec
-
SHA512
d8cb4565aa23c12a27bd52b6034f665b33d5220bbd70715c8ab32b4f5844bf9ea7ccdf94214f156abc9b2deef3f5370937e930654420e8e92851c26a1df1fe04
-
SSDEEP
12288:OMrry90iOenEo7jPBFi6n70jq9ql+aLZl4HOvOqDen6:FylOeB7jpFigqoUG6
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
Executes dropped EXE 2 IoCs
pid Process 3560 1ci04bI1.exe 2652 2tT2115.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.0f1bd6117e909bd57dfadb3cb6548350_JC.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3560 set thread context of 3636 3560 1ci04bI1.exe 91 PID 2652 set thread context of 1360 2652 2tT2115.exe 98 -
Program crash 3 IoCs
pid pid_target Process procid_target 912 3560 WerFault.exe 88 4472 2652 WerFault.exe 95 3204 1360 WerFault.exe 98 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3636 AppLaunch.exe 3636 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3636 AppLaunch.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3732 wrote to memory of 3560 3732 NEAS.0f1bd6117e909bd57dfadb3cb6548350_JC.exe 88 PID 3732 wrote to memory of 3560 3732 NEAS.0f1bd6117e909bd57dfadb3cb6548350_JC.exe 88 PID 3732 wrote to memory of 3560 3732 NEAS.0f1bd6117e909bd57dfadb3cb6548350_JC.exe 88 PID 3560 wrote to memory of 4504 3560 1ci04bI1.exe 89 PID 3560 wrote to memory of 4504 3560 1ci04bI1.exe 89 PID 3560 wrote to memory of 4504 3560 1ci04bI1.exe 89 PID 3560 wrote to memory of 3636 3560 1ci04bI1.exe 91 PID 3560 wrote to memory of 3636 3560 1ci04bI1.exe 91 PID 3560 wrote to memory of 3636 3560 1ci04bI1.exe 91 PID 3560 wrote to memory of 3636 3560 1ci04bI1.exe 91 PID 3560 wrote to memory of 3636 3560 1ci04bI1.exe 91 PID 3560 wrote to memory of 3636 3560 1ci04bI1.exe 91 PID 3560 wrote to memory of 3636 3560 1ci04bI1.exe 91 PID 3560 wrote to memory of 3636 3560 1ci04bI1.exe 91 PID 3732 wrote to memory of 2652 3732 NEAS.0f1bd6117e909bd57dfadb3cb6548350_JC.exe 95 PID 3732 wrote to memory of 2652 3732 NEAS.0f1bd6117e909bd57dfadb3cb6548350_JC.exe 95 PID 3732 wrote to memory of 2652 3732 NEAS.0f1bd6117e909bd57dfadb3cb6548350_JC.exe 95 PID 2652 wrote to memory of 2972 2652 2tT2115.exe 97 PID 2652 wrote to memory of 2972 2652 2tT2115.exe 97 PID 2652 wrote to memory of 2972 2652 2tT2115.exe 97 PID 2652 wrote to memory of 1360 2652 2tT2115.exe 98 PID 2652 wrote to memory of 1360 2652 2tT2115.exe 98 PID 2652 wrote to memory of 1360 2652 2tT2115.exe 98 PID 2652 wrote to memory of 1360 2652 2tT2115.exe 98 PID 2652 wrote to memory of 1360 2652 2tT2115.exe 98 PID 2652 wrote to memory of 1360 2652 2tT2115.exe 98 PID 2652 wrote to memory of 1360 2652 2tT2115.exe 98 PID 2652 wrote to memory of 1360 2652 2tT2115.exe 98 PID 2652 wrote to memory of 1360 2652 2tT2115.exe 98 PID 2652 wrote to memory of 1360 2652 2tT2115.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.0f1bd6117e909bd57dfadb3cb6548350_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.0f1bd6117e909bd57dfadb3cb6548350_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1ci04bI1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1ci04bI1.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:4504
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 5843⤵
- Program crash
PID:912
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2tT2115.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2tT2115.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:2972
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:1360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 5404⤵
- Program crash
PID:3204
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 5723⤵
- Program crash
PID:4472
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3560 -ip 35601⤵PID:4476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2652 -ip 26521⤵PID:2020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1360 -ip 13601⤵PID:4640
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
1.1MB
MD5aff391887d64d7fad618f3353eff87a5
SHA1f9a4de0fc9c0731761ccc9104cbe1dcc6546e317
SHA256dc992344284f1c5af01ca599efafa4740396f1a9cd5e41f8b4e60367d43bb863
SHA512b1ee0443d21a815a5a62c0f413ab8ca5dfe2a4af472050f755cf95ad56f2d4242f9755e7d733c0340baf5c4b921756e5456e6f962e8b76cc743b0087c8a3a4b1
-
Filesize
1.1MB
MD5aff391887d64d7fad618f3353eff87a5
SHA1f9a4de0fc9c0731761ccc9104cbe1dcc6546e317
SHA256dc992344284f1c5af01ca599efafa4740396f1a9cd5e41f8b4e60367d43bb863
SHA512b1ee0443d21a815a5a62c0f413ab8ca5dfe2a4af472050f755cf95ad56f2d4242f9755e7d733c0340baf5c4b921756e5456e6f962e8b76cc743b0087c8a3a4b1