Analysis
-
max time kernel
117s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16/10/2023, 16:31
Behavioral task
behavioral1
Sample
NEAS.1ec45c64b94740d7cb77d53164128600_JC.exe
Resource
win7-20230831-en
General
-
Target
NEAS.1ec45c64b94740d7cb77d53164128600_JC.exe
-
Size
38KB
-
MD5
1ec45c64b94740d7cb77d53164128600
-
SHA1
c01cf7f8117e2c7cd9cb84a6168c5c6b6b11d23e
-
SHA256
0e8635946a6146db42d619edf9d5a27a0084d6b301647c8f4afdb67c304fc008
-
SHA512
1e6e438dbdef61cd87ac845bc379dcab6126dcc06d36e222ed5e3e0d53c42286f04b3cb2c459c485f070c355b917bcfc5012ccb499d69dd419e3dff6ba59324a
-
SSDEEP
768:Nzj1JegVa3Gry+uELEmITCs/NUZ6nZdYbCLECkrQoP9fmF2f1cOI:NWQa2TLEmITcoQxfllfmS1cOI
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2648 smss.exe -
Loads dropped DLL 2 IoCs
pid Process 2016 NEAS.1ec45c64b94740d7cb77d53164128600_JC.exe 2016 NEAS.1ec45c64b94740d7cb77d53164128600_JC.exe -
resource yara_rule behavioral1/memory/2016-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2016-2-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2016-4-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/files/0x0008000000016cac-7.dat upx behavioral1/files/0x0008000000016cac-13.dat upx behavioral1/files/0x0008000000016cac-12.dat upx behavioral1/files/0x0008000000016cac-9.dat upx behavioral1/files/0x0008000000016cac-16.dat upx behavioral1/memory/2016-18-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2648-19-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe NEAS.1ec45c64b94740d7cb77d53164128600_JC.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3028 sc.exe 2708 sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2016 NEAS.1ec45c64b94740d7cb77d53164128600_JC.exe 2648 smss.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2016 wrote to memory of 3028 2016 NEAS.1ec45c64b94740d7cb77d53164128600_JC.exe 29 PID 2016 wrote to memory of 3028 2016 NEAS.1ec45c64b94740d7cb77d53164128600_JC.exe 29 PID 2016 wrote to memory of 3028 2016 NEAS.1ec45c64b94740d7cb77d53164128600_JC.exe 29 PID 2016 wrote to memory of 3028 2016 NEAS.1ec45c64b94740d7cb77d53164128600_JC.exe 29 PID 2016 wrote to memory of 2648 2016 NEAS.1ec45c64b94740d7cb77d53164128600_JC.exe 31 PID 2016 wrote to memory of 2648 2016 NEAS.1ec45c64b94740d7cb77d53164128600_JC.exe 31 PID 2016 wrote to memory of 2648 2016 NEAS.1ec45c64b94740d7cb77d53164128600_JC.exe 31 PID 2016 wrote to memory of 2648 2016 NEAS.1ec45c64b94740d7cb77d53164128600_JC.exe 31 PID 2648 wrote to memory of 2708 2648 smss.exe 32 PID 2648 wrote to memory of 2708 2648 smss.exe 32 PID 2648 wrote to memory of 2708 2648 smss.exe 32 PID 2648 wrote to memory of 2708 2648 smss.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.1ec45c64b94740d7cb77d53164128600_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.1ec45c64b94740d7cb77d53164128600_JC.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
PID:3028
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
PID:2708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD553eb33d67bad0a03ecedace1cc847054
SHA19a48397e7739a39ac11a30f3bae515cdc472ca0e
SHA256bad35e34a71bf350b8b5d0311772f64dc0153a7d38326384108eb00096c7f020
SHA512d36e1f8ee3ab0fbb4b85522a8516aea1a3b739673aa7d6e13b566ae5a424e2d10c525a6a977a6f5bcb03ebf989eddb8076d8119bfef5007a616299f234bec49d
-
Filesize
38KB
MD553eb33d67bad0a03ecedace1cc847054
SHA19a48397e7739a39ac11a30f3bae515cdc472ca0e
SHA256bad35e34a71bf350b8b5d0311772f64dc0153a7d38326384108eb00096c7f020
SHA512d36e1f8ee3ab0fbb4b85522a8516aea1a3b739673aa7d6e13b566ae5a424e2d10c525a6a977a6f5bcb03ebf989eddb8076d8119bfef5007a616299f234bec49d
-
Filesize
38KB
MD553eb33d67bad0a03ecedace1cc847054
SHA19a48397e7739a39ac11a30f3bae515cdc472ca0e
SHA256bad35e34a71bf350b8b5d0311772f64dc0153a7d38326384108eb00096c7f020
SHA512d36e1f8ee3ab0fbb4b85522a8516aea1a3b739673aa7d6e13b566ae5a424e2d10c525a6a977a6f5bcb03ebf989eddb8076d8119bfef5007a616299f234bec49d
-
Filesize
38KB
MD553eb33d67bad0a03ecedace1cc847054
SHA19a48397e7739a39ac11a30f3bae515cdc472ca0e
SHA256bad35e34a71bf350b8b5d0311772f64dc0153a7d38326384108eb00096c7f020
SHA512d36e1f8ee3ab0fbb4b85522a8516aea1a3b739673aa7d6e13b566ae5a424e2d10c525a6a977a6f5bcb03ebf989eddb8076d8119bfef5007a616299f234bec49d
-
Filesize
38KB
MD553eb33d67bad0a03ecedace1cc847054
SHA19a48397e7739a39ac11a30f3bae515cdc472ca0e
SHA256bad35e34a71bf350b8b5d0311772f64dc0153a7d38326384108eb00096c7f020
SHA512d36e1f8ee3ab0fbb4b85522a8516aea1a3b739673aa7d6e13b566ae5a424e2d10c525a6a977a6f5bcb03ebf989eddb8076d8119bfef5007a616299f234bec49d