Analysis

  • max time kernel
    122s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2023, 15:03

General

  • Target

    NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe

  • Size

    150KB

  • MD5

    22d1d944ee02ee8333135bd3d3e1a710

  • SHA1

    26f1ca50a899ac998415b1b12b7c0a5906f89510

  • SHA256

    1a9defad0136f023036e8283a6aec9edfa87b3fc9443308183174773bac2f937

  • SHA512

    313c3538caa19eb7f76587eaa075323282db4fd007c10203a2b899a6f32a22b3bf003ad3c6573c509733872142765437d11297c089f79cd2775a0aa3089f60d4

  • SSDEEP

    3072:7Aji4nTkCMflHkyY7uBvvWbpfrTrKDARSiLvbMLfmPwk6S4nDgUX:7AjlYCMM2HWbRvrQAZvQLowHM

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1264
      • C:\Users\Admin\AppData\Local\Temp\NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe
        "C:\Users\Admin\AppData\Local\Temp\NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:2972

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2972-2-0x0000000000230000-0x000000000024D000-memory.dmp

            Filesize

            116KB

          • memory/2972-0-0x0000000000220000-0x000000000022D000-memory.dmp

            Filesize

            52KB

          • memory/2972-3-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/2972-5-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB