Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 13:08
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.13bd423018e421903876e6ae0cb11ee0_JC.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.13bd423018e421903876e6ae0cb11ee0_JC.dll
Resource
win10v2004-20230915-en
General
-
Target
NEAS.13bd423018e421903876e6ae0cb11ee0_JC.dll
-
Size
764KB
-
MD5
13bd423018e421903876e6ae0cb11ee0
-
SHA1
0f360992031b395c6c1a6880fabbd8d76c1d2058
-
SHA256
e100ce83261727fc78c1999eefbfd8f427ea2bfcd1d3d7c6e52d49588784dd99
-
SHA512
b8b6acf3e983c3cc14e761e41cf9787636e1673cda33843bede06b1f1f6413fac68501092e4723b6167d68525f28653ce5a152167221647dc780a0eff12deb13
-
SSDEEP
12288:etEdvmPl8io197UYWiaDQ9nAUqq7CgDz3X+9NuYknWPg6ia6:ypl8ZX7RfaDQ9nCYzX+9NuYko6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1732 4135.tmp -
Loads dropped DLL 2 IoCs
pid Process 3056 rundll32.exe 3056 rundll32.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEEX.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OISGRAPH.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VVIEWDWG.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeXMP.dll 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CDLMSO.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDCAT.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\BIB.dll 4135.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia.api 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ContactPicker.dll 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONBttnPPT.dll 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MIMEDIR.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLFLTR.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.dll 4135.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACECORE.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCNPST32.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACEODBC.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXSEC32.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IPOLK.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPCORE.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\drvDX9.x3d 4135.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\JPEGIM32.FLT 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\OL.SAM 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ENVELOPE.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADDINS\UmOutlookAddin.dll 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSTH7ES.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\msmdlocal.dll 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EMSMDB32.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OWSSUPP.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\IA32.api 4135.tmp File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\xmlrw.dll 4135.tmp File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe 4135.tmp File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR.dll 4135.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLMF.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ogalegit.dll 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIMG.DLL 4135.tmp File opened for modification C:\Program Files\7-Zip\7z.sfx 4135.tmp File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\xmlrwbin.dll 4135.tmp File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VISSHE.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHEVI.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\FDATE.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\DLGSETP.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\OLNOTE.FAE 4135.tmp File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdaterInstallMgr.exe 4135.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\GIFIMP32.FLT 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SOCIALCONNECTOR.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\OLTASK.FAE 4135.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Portal\PortalConnectCore.dll 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLVBS.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\goopdate.dll 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MAPIPH.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\WindowsMedia.mpp 4135.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VC\msdia90.dll 4135.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\ODeploy.exe 4135.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOLoader.dll 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VPREVIEW.EXE 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\DELIMWIN.FAE 4135.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSSP7EN.DLL 4135.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\MCIMPP.mpp 4135.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\RICHED20.DLL 4135.tmp -
Program crash 1 IoCs
pid pid_target Process procid_target 2712 3056 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3060 wrote to memory of 3056 3060 rundll32.exe 28 PID 3060 wrote to memory of 3056 3060 rundll32.exe 28 PID 3060 wrote to memory of 3056 3060 rundll32.exe 28 PID 3060 wrote to memory of 3056 3060 rundll32.exe 28 PID 3060 wrote to memory of 3056 3060 rundll32.exe 28 PID 3060 wrote to memory of 3056 3060 rundll32.exe 28 PID 3060 wrote to memory of 3056 3060 rundll32.exe 28 PID 3056 wrote to memory of 1732 3056 rundll32.exe 29 PID 3056 wrote to memory of 1732 3056 rundll32.exe 29 PID 3056 wrote to memory of 1732 3056 rundll32.exe 29 PID 3056 wrote to memory of 1732 3056 rundll32.exe 29 PID 3056 wrote to memory of 2712 3056 rundll32.exe 30 PID 3056 wrote to memory of 2712 3056 rundll32.exe 30 PID 3056 wrote to memory of 2712 3056 rundll32.exe 30 PID 3056 wrote to memory of 2712 3056 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.13bd423018e421903876e6ae0cb11ee0_JC.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.13bd423018e421903876e6ae0cb11ee0_JC.dll,#12⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\4135.tmpC:\Users\Admin\AppData\Local\Temp\4135.tmp3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 2043⤵
- Program crash
PID:2712
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666