Analysis

  • max time kernel
    141s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2023, 14:07

General

  • Target

    NEAS.1ca5e5e845ca8020d621e144b57be5c0_JC.exe

  • Size

    77KB

  • MD5

    1ca5e5e845ca8020d621e144b57be5c0

  • SHA1

    d293f3de91d5e773f5b21a25be64598665907853

  • SHA256

    d32f8807c06ee9b38be3e240ec7e3bd11997a996d33646f8cad08ee32c2b9132

  • SHA512

    ce6ba20bbdb97c7b17e4b2f460a0f886cd455b10462704e1b32886f0f194848f44380c37607c6b6de6eb6cf799edc0643bda6fbba3ae237ade0f84cddb175c29

  • SSDEEP

    1536:NB+FC9RntfWeoGiPyCHjKDjfQQQtUetDA:NB+F8tfPN4yCDKDjfQQQtu

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.1ca5e5e845ca8020d621e144b57be5c0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.1ca5e5e845ca8020d621e144b57be5c0_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      PID:2052

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\budha.exe

          Filesize

          77KB

          MD5

          dc70533d6a7a9294732c296fd1dc0b5e

          SHA1

          d88664607aa04e7407236e691d54f653a0a1d123

          SHA256

          5fa789ac7ab3fc7a78319ada926bd7ad480408a89b5c7ddce3fabaac5110b8ac

          SHA512

          a4aa8198ff9528ee417050f243cfd3eb32ab8caebdf70619a0c83d1a1a15045b13cb19b3644573354ac20f85807e98b5711edc386595a5f09ff155570f03db70

        • C:\Users\Admin\AppData\Local\Temp\budha.exe

          Filesize

          77KB

          MD5

          dc70533d6a7a9294732c296fd1dc0b5e

          SHA1

          d88664607aa04e7407236e691d54f653a0a1d123

          SHA256

          5fa789ac7ab3fc7a78319ada926bd7ad480408a89b5c7ddce3fabaac5110b8ac

          SHA512

          a4aa8198ff9528ee417050f243cfd3eb32ab8caebdf70619a0c83d1a1a15045b13cb19b3644573354ac20f85807e98b5711edc386595a5f09ff155570f03db70

        • C:\Users\Admin\AppData\Local\Temp\budha.exe

          Filesize

          77KB

          MD5

          dc70533d6a7a9294732c296fd1dc0b5e

          SHA1

          d88664607aa04e7407236e691d54f653a0a1d123

          SHA256

          5fa789ac7ab3fc7a78319ada926bd7ad480408a89b5c7ddce3fabaac5110b8ac

          SHA512

          a4aa8198ff9528ee417050f243cfd3eb32ab8caebdf70619a0c83d1a1a15045b13cb19b3644573354ac20f85807e98b5711edc386595a5f09ff155570f03db70

        • \Users\Admin\AppData\Local\Temp\budha.exe

          Filesize

          77KB

          MD5

          dc70533d6a7a9294732c296fd1dc0b5e

          SHA1

          d88664607aa04e7407236e691d54f653a0a1d123

          SHA256

          5fa789ac7ab3fc7a78319ada926bd7ad480408a89b5c7ddce3fabaac5110b8ac

          SHA512

          a4aa8198ff9528ee417050f243cfd3eb32ab8caebdf70619a0c83d1a1a15045b13cb19b3644573354ac20f85807e98b5711edc386595a5f09ff155570f03db70

        • \Users\Admin\AppData\Local\Temp\budha.exe

          Filesize

          77KB

          MD5

          dc70533d6a7a9294732c296fd1dc0b5e

          SHA1

          d88664607aa04e7407236e691d54f653a0a1d123

          SHA256

          5fa789ac7ab3fc7a78319ada926bd7ad480408a89b5c7ddce3fabaac5110b8ac

          SHA512

          a4aa8198ff9528ee417050f243cfd3eb32ab8caebdf70619a0c83d1a1a15045b13cb19b3644573354ac20f85807e98b5711edc386595a5f09ff155570f03db70

        • memory/1100-5-0x00000000026B0000-0x0000000002AB0000-memory.dmp

          Filesize

          4.0MB

        • memory/1100-0-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/1100-3-0x0000000001E40000-0x0000000001E41000-memory.dmp

          Filesize

          4KB

        • memory/1100-1-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/1100-8-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/1100-2-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/2052-18-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/2052-19-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/2052-20-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/2052-22-0x0000000002020000-0x0000000002021000-memory.dmp

          Filesize

          4KB

        • memory/2052-23-0x0000000002710000-0x0000000002B10000-memory.dmp

          Filesize

          4.0MB

        • memory/2052-24-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB