Analysis

  • max time kernel
    166s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/10/2023, 14:05

General

  • Target

    NEAS.03b30e9c35e492f3440e414a0acaba8e_JC.exe

  • Size

    567KB

  • MD5

    03b30e9c35e492f3440e414a0acaba8e

  • SHA1

    5294f4262b2d22edd570da5b2b160a4acdad7195

  • SHA256

    72168a89750f62e78b06569c50f163bc162d53efb68e186f13cb9acbb21d9f63

  • SHA512

    38534212073afa4fa4c78cdf4552c3e9f9d9d6db2fef5881cb10694169d50cc3ae31d1950c676ede88c3a949f0697839ca56aad3912758c25517c081be562c36

  • SSDEEP

    12288:Gw6104iQwNHuT6xzEj95Hh4dHlo6RQmtWMWOPDtocYx4H6UZF:Gw610bbHuT6i/BkF7RQmtWMWOPJS4H68

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.03b30e9c35e492f3440e414a0acaba8e_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.03b30e9c35e492f3440e414a0acaba8e_JC.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:1912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\xdccPrograms\7z.exe

    Filesize

    607KB

    MD5

    007cac9f6775cf26cbd5ee7f1ed49b6e

    SHA1

    88c4bed5a90c075ced2a3ba10de269dada63035d

    SHA256

    bdca2bae4b3fbf805623cdc49e633852ccaa204e5acd0a029e73c77c51ac7afc

    SHA512

    5b603d287392085bfde2f2662b71009680cff8a447daa8a2716390818b5c61cc6e4cf9b4ee20cd3ca0914ec35241dd353908a7999367131037d707cc880f05c2

  • memory/1912-20-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1912-25-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1912-26-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1912-44-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1912-83-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1912-84-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1912-85-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1912-86-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1912-87-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1912-88-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1912-89-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1912-90-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1912-91-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1912-92-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB