Analysis
-
max time kernel
122s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
21/10/2023, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe
-
Size
192KB
-
MD5
8cf4f6b238457c45f099927720f93ca0
-
SHA1
acf6e94c19b9a726de0b29877da21a28013a3135
-
SHA256
c1f11ec52c21b16193bbd3769b086f916bb8ce3719cb63e5adcad59a8efec181
-
SHA512
2d3988a81abf7d145abc40ac1b20220ae821596a4de95dcd9a82f43c8fd389344672c7df023d6d64deeed444281b6bf364913a219a9e26077ba75a4b1235a7e0
-
SSDEEP
6144:eZdH9b5/Keg7tkqxrqLckP+xn0YOBI+AG0TG0Ahuhuf:eTdcB7DrVkP+xnXOBI+AM0Guu
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\winhash_up.exe NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe File created C:\Windows\SHARE_TEMP\Icon3.ico NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe File created C:\Windows\SHARE_TEMP\Icon5.ico NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe File opened for modification C:\Windows\winhash_up.exez NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe File created C:\Windows\SHARE_TEMP\Icon2.ico NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe File created C:\Windows\SHARE_TEMP\Icon6.ico NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe File created C:\Windows\SHARE_TEMP\Icon10.ico NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe File created C:\Windows\bugMAKER.bat NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe File created C:\Windows\SHARE_TEMP\Icon12.ico NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe File created C:\Windows\SHARE_TEMP\Icon13.ico NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe File created C:\Windows\SHARE_TEMP\Icon14.ico NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe File created C:\Windows\winhash_up.exez NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe File created C:\Windows\SHARE_TEMP\Icon7.ico NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 1068 2104 NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe 31 PID 2104 wrote to memory of 1068 2104 NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe 31 PID 2104 wrote to memory of 1068 2104 NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe 31 PID 2104 wrote to memory of 1068 2104 NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:1068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84B
MD54617ac698be443850252be4845be5ae4
SHA16a59e983396a34f225d36fba6acaf2765879c515
SHA25617901f1e827e9f3f304ff690fa9fe6c89016297cc404f6af9883a853adf6f249
SHA512a81189c41d50508a34b9e03bf0412335ef69142894470e49ae732f8d19d78149fe61814de5ddd465cc443e857afa91a6e535ffc82ab2eda22e5c9f884e11658f
-
Filesize
84B
MD54617ac698be443850252be4845be5ae4
SHA16a59e983396a34f225d36fba6acaf2765879c515
SHA25617901f1e827e9f3f304ff690fa9fe6c89016297cc404f6af9883a853adf6f249
SHA512a81189c41d50508a34b9e03bf0412335ef69142894470e49ae732f8d19d78149fe61814de5ddd465cc443e857afa91a6e535ffc82ab2eda22e5c9f884e11658f