Analysis

  • max time kernel
    168s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2023, 14:05

General

  • Target

    NEAS.03b30e9c35e492f3440e414a0acaba8e_JC.exe

  • Size

    567KB

  • MD5

    03b30e9c35e492f3440e414a0acaba8e

  • SHA1

    5294f4262b2d22edd570da5b2b160a4acdad7195

  • SHA256

    72168a89750f62e78b06569c50f163bc162d53efb68e186f13cb9acbb21d9f63

  • SHA512

    38534212073afa4fa4c78cdf4552c3e9f9d9d6db2fef5881cb10694169d50cc3ae31d1950c676ede88c3a949f0697839ca56aad3912758c25517c081be562c36

  • SSDEEP

    12288:Gw6104iQwNHuT6xzEj95Hh4dHlo6RQmtWMWOPDtocYx4H6UZF:Gw610bbHuT6i/BkF7RQmtWMWOPJS4H68

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.03b30e9c35e492f3440e414a0acaba8e_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.03b30e9c35e492f3440e414a0acaba8e_JC.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:2188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

    Filesize

    847KB

    MD5

    d0827cabea8553e998d3c825a73c67be

    SHA1

    590e0cc76a78ffba06fc3bb6a2099bc12dc97987

    SHA256

    80bd40706ba324b464b6783b84df0e13ae26869b64ce8abbc24a307158f37f82

    SHA512

    7f5c09b67fa86855b6106bc0e6d84c9473fe97774d4151a3239392a05f8b44437fb2257fc35742296cd8cce2ba5e87a40f2523d4ac30a06ebbe5f178ba40f76b

  • memory/2188-108-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2188-109-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2188-110-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2188-111-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2188-112-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2188-113-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2188-114-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2188-115-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2188-116-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2188-117-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2188-118-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2188-119-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2188-120-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2188-121-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB