Analysis

  • max time kernel
    122s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    16/10/2023, 12:51

General

  • Target

    NEAS.NEAS6e72688cdb1c84b826798dff4f2aabc4a49c977e28b98fd3bcdf38b846ed9a22exeexe_JC.exe

  • Size

    895KB

  • MD5

    ac9b9aafc5582ad1b5ef589e0d5379df

  • SHA1

    d777d83b130e962fafd2bfe22c72e31858181d53

  • SHA256

    6e72688cdb1c84b826798dff4f2aabc4a49c977e28b98fd3bcdf38b846ed9a22

  • SHA512

    ce2fb8326b12ad2253bcc6d9a81868629c2cd4695bbccc20f9bd90db9892af3dc9611faa620418cf0576ed18376356c19535c00e6ef1138faa7c974072c20bf1

  • SSDEEP

    12288:UMrmy90IifQi7V/FYz/Ho7jP0+iO5MZuAdKUTTLgNEPg3XNAm6R35SQcHhitg4uU:6y4oiR/F2/I7js+iO6ndhnCEo39ARn

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.NEAS6e72688cdb1c84b826798dff4f2aabc4a49c977e28b98fd3bcdf38b846ed9a22exeexe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.NEAS6e72688cdb1c84b826798dff4f2aabc4a49c977e28b98fd3bcdf38b846ed9a22exeexe_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mh2sA12.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mh2sA12.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2320
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1jB69uQ4.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1jB69uQ4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2540
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1624
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2540 -s 272
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2944

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mh2sA12.exe

          Filesize

          533KB

          MD5

          28b98a4bf4da3dcd6eb08b7f740f171e

          SHA1

          0476f9b0b1cf67920c51e3f0d29d80d170a127f0

          SHA256

          6b0eba67d7da231d373c94058892c5c14af8d10c8e3182a90f6f341008ae949a

          SHA512

          7fb4cf4c87ccdd94eeba68f714777695c1b8921e557cba1e632ce3482a0564a4a86d60e6fc2550a09497f7c7e3b835c8f9cecd8d59a2cb59db4d527a2b409ebe

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mh2sA12.exe

          Filesize

          533KB

          MD5

          28b98a4bf4da3dcd6eb08b7f740f171e

          SHA1

          0476f9b0b1cf67920c51e3f0d29d80d170a127f0

          SHA256

          6b0eba67d7da231d373c94058892c5c14af8d10c8e3182a90f6f341008ae949a

          SHA512

          7fb4cf4c87ccdd94eeba68f714777695c1b8921e557cba1e632ce3482a0564a4a86d60e6fc2550a09497f7c7e3b835c8f9cecd8d59a2cb59db4d527a2b409ebe

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1jB69uQ4.exe

          Filesize

          232KB

          MD5

          3ff825411b1fe07e712a5dcae34f80eb

          SHA1

          e3e4358cabfa74d6e36e26754b01ed78434a6877

          SHA256

          69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

          SHA512

          325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1jB69uQ4.exe

          Filesize

          232KB

          MD5

          3ff825411b1fe07e712a5dcae34f80eb

          SHA1

          e3e4358cabfa74d6e36e26754b01ed78434a6877

          SHA256

          69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

          SHA512

          325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\mh2sA12.exe

          Filesize

          533KB

          MD5

          28b98a4bf4da3dcd6eb08b7f740f171e

          SHA1

          0476f9b0b1cf67920c51e3f0d29d80d170a127f0

          SHA256

          6b0eba67d7da231d373c94058892c5c14af8d10c8e3182a90f6f341008ae949a

          SHA512

          7fb4cf4c87ccdd94eeba68f714777695c1b8921e557cba1e632ce3482a0564a4a86d60e6fc2550a09497f7c7e3b835c8f9cecd8d59a2cb59db4d527a2b409ebe

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\mh2sA12.exe

          Filesize

          533KB

          MD5

          28b98a4bf4da3dcd6eb08b7f740f171e

          SHA1

          0476f9b0b1cf67920c51e3f0d29d80d170a127f0

          SHA256

          6b0eba67d7da231d373c94058892c5c14af8d10c8e3182a90f6f341008ae949a

          SHA512

          7fb4cf4c87ccdd94eeba68f714777695c1b8921e557cba1e632ce3482a0564a4a86d60e6fc2550a09497f7c7e3b835c8f9cecd8d59a2cb59db4d527a2b409ebe

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\1jB69uQ4.exe

          Filesize

          232KB

          MD5

          3ff825411b1fe07e712a5dcae34f80eb

          SHA1

          e3e4358cabfa74d6e36e26754b01ed78434a6877

          SHA256

          69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

          SHA512

          325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\1jB69uQ4.exe

          Filesize

          232KB

          MD5

          3ff825411b1fe07e712a5dcae34f80eb

          SHA1

          e3e4358cabfa74d6e36e26754b01ed78434a6877

          SHA256

          69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

          SHA512

          325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\1jB69uQ4.exe

          Filesize

          232KB

          MD5

          3ff825411b1fe07e712a5dcae34f80eb

          SHA1

          e3e4358cabfa74d6e36e26754b01ed78434a6877

          SHA256

          69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

          SHA512

          325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\1jB69uQ4.exe

          Filesize

          232KB

          MD5

          3ff825411b1fe07e712a5dcae34f80eb

          SHA1

          e3e4358cabfa74d6e36e26754b01ed78434a6877

          SHA256

          69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

          SHA512

          325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\1jB69uQ4.exe

          Filesize

          232KB

          MD5

          3ff825411b1fe07e712a5dcae34f80eb

          SHA1

          e3e4358cabfa74d6e36e26754b01ed78434a6877

          SHA256

          69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

          SHA512

          325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\1jB69uQ4.exe

          Filesize

          232KB

          MD5

          3ff825411b1fe07e712a5dcae34f80eb

          SHA1

          e3e4358cabfa74d6e36e26754b01ed78434a6877

          SHA256

          69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

          SHA512

          325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

        • memory/1624-22-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/1624-25-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/1624-29-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/1624-27-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/1624-24-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/1624-23-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/1624-21-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/1624-20-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB