Analysis
-
max time kernel
189s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 15:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe
Resource
win7-20230831-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe
Resource
win10v2004-20230915-en
5 signatures
150 seconds
General
-
Target
NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe
-
Size
150KB
-
MD5
22d1d944ee02ee8333135bd3d3e1a710
-
SHA1
26f1ca50a899ac998415b1b12b7c0a5906f89510
-
SHA256
1a9defad0136f023036e8283a6aec9edfa87b3fc9443308183174773bac2f937
-
SHA512
313c3538caa19eb7f76587eaa075323282db4fd007c10203a2b899a6f32a22b3bf003ad3c6573c509733872142765437d11297c089f79cd2775a0aa3089f60d4
-
SSDEEP
3072:7Aji4nTkCMflHkyY7uBvvWbpfrTrKDARSiLvbMLfmPwk6S4nDgUX:7AjlYCMM2HWbRvrQAZvQLowHM
Score
3/10
Malware Config
Signatures
-
Program crash 2 IoCs
pid pid_target Process procid_target 1608 1032 WerFault.exe 81 2012 1032 WerFault.exe 81 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 5116089176693011456 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 18014398509481984000 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 14843864371813154816 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 12827009313855766530 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 10880696699727118336 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 11025526570361028610 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 9440236422637289474 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 8142508126285856770 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 6629298651489370112 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 8143167833262684160 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 6124895503189540864 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 576460752303560704 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 0 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 0 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 5116089176693011456 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 18014398509481984000 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 14843864371813154816 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 12827009313855766530 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 10880696699727118336 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 11025526570361028610 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 9440236422637289474 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 8142508126285856770 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 6629298651489370112 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 8143167833262684160 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 6124895503189540864 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 576460752303560704 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 0 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 0 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 5116089176693011456 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 18014398509481984000 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 14843864371813154816 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 12827009313855766530 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 10880696699727118336 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 11025526570361028610 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 9440236422637289474 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 8142508126285856770 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 6629298651489370112 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 8143167833262684160 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 6124895503189540864 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 576460752303560704 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 0 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 0 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 5116089176693011456 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 18014398509481984000 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 14843864371813154816 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 12827009313855766530 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 10880696699727118336 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 11025526570361028610 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 9440236422637289474 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 8142508126285856770 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 6629298651489370112 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 8143167833262684160 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 6124895503189540864 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 576460752303560704 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 0 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 0 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 5116089176693011456 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 18014398509481984000 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 14843864371813154816 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 12827009313855766530 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 10880696699727118336 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 11025526570361028610 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 9440236422637289474 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe Token: 8142508126285856770 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1608 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe 89 PID 1032 wrote to memory of 1608 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe 89 PID 1032 wrote to memory of 1608 1032 NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.22d1d944ee02ee8333135bd3d3e1a710_JC.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1032 -s 4522⤵
- Program crash
PID:1608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1032 -s 4522⤵
- Program crash
PID:2012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1032 -ip 10321⤵PID:2228