Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 14:07
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.1ca5e5e845ca8020d621e144b57be5c0_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.1ca5e5e845ca8020d621e144b57be5c0_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.1ca5e5e845ca8020d621e144b57be5c0_JC.exe
-
Size
77KB
-
MD5
1ca5e5e845ca8020d621e144b57be5c0
-
SHA1
d293f3de91d5e773f5b21a25be64598665907853
-
SHA256
d32f8807c06ee9b38be3e240ec7e3bd11997a996d33646f8cad08ee32c2b9132
-
SHA512
ce6ba20bbdb97c7b17e4b2f460a0f886cd455b10462704e1b32886f0f194848f44380c37607c6b6de6eb6cf799edc0643bda6fbba3ae237ade0f84cddb175c29
-
SSDEEP
1536:NB+FC9RntfWeoGiPyCHjKDjfQQQtUetDA:NB+F8tfPN4yCDKDjfQQQtu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2052 budha.exe -
Loads dropped DLL 2 IoCs
pid Process 1100 NEAS.1ca5e5e845ca8020d621e144b57be5c0_JC.exe 1100 NEAS.1ca5e5e845ca8020d621e144b57be5c0_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1100 wrote to memory of 2052 1100 NEAS.1ca5e5e845ca8020d621e144b57be5c0_JC.exe 28 PID 1100 wrote to memory of 2052 1100 NEAS.1ca5e5e845ca8020d621e144b57be5c0_JC.exe 28 PID 1100 wrote to memory of 2052 1100 NEAS.1ca5e5e845ca8020d621e144b57be5c0_JC.exe 28 PID 1100 wrote to memory of 2052 1100 NEAS.1ca5e5e845ca8020d621e144b57be5c0_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.1ca5e5e845ca8020d621e144b57be5c0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.1ca5e5e845ca8020d621e144b57be5c0_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5dc70533d6a7a9294732c296fd1dc0b5e
SHA1d88664607aa04e7407236e691d54f653a0a1d123
SHA2565fa789ac7ab3fc7a78319ada926bd7ad480408a89b5c7ddce3fabaac5110b8ac
SHA512a4aa8198ff9528ee417050f243cfd3eb32ab8caebdf70619a0c83d1a1a15045b13cb19b3644573354ac20f85807e98b5711edc386595a5f09ff155570f03db70
-
Filesize
77KB
MD5dc70533d6a7a9294732c296fd1dc0b5e
SHA1d88664607aa04e7407236e691d54f653a0a1d123
SHA2565fa789ac7ab3fc7a78319ada926bd7ad480408a89b5c7ddce3fabaac5110b8ac
SHA512a4aa8198ff9528ee417050f243cfd3eb32ab8caebdf70619a0c83d1a1a15045b13cb19b3644573354ac20f85807e98b5711edc386595a5f09ff155570f03db70
-
Filesize
77KB
MD5dc70533d6a7a9294732c296fd1dc0b5e
SHA1d88664607aa04e7407236e691d54f653a0a1d123
SHA2565fa789ac7ab3fc7a78319ada926bd7ad480408a89b5c7ddce3fabaac5110b8ac
SHA512a4aa8198ff9528ee417050f243cfd3eb32ab8caebdf70619a0c83d1a1a15045b13cb19b3644573354ac20f85807e98b5711edc386595a5f09ff155570f03db70
-
Filesize
77KB
MD5dc70533d6a7a9294732c296fd1dc0b5e
SHA1d88664607aa04e7407236e691d54f653a0a1d123
SHA2565fa789ac7ab3fc7a78319ada926bd7ad480408a89b5c7ddce3fabaac5110b8ac
SHA512a4aa8198ff9528ee417050f243cfd3eb32ab8caebdf70619a0c83d1a1a15045b13cb19b3644573354ac20f85807e98b5711edc386595a5f09ff155570f03db70
-
Filesize
77KB
MD5dc70533d6a7a9294732c296fd1dc0b5e
SHA1d88664607aa04e7407236e691d54f653a0a1d123
SHA2565fa789ac7ab3fc7a78319ada926bd7ad480408a89b5c7ddce3fabaac5110b8ac
SHA512a4aa8198ff9528ee417050f243cfd3eb32ab8caebdf70619a0c83d1a1a15045b13cb19b3644573354ac20f85807e98b5711edc386595a5f09ff155570f03db70