Analysis

  • max time kernel
    122s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    21/10/2023, 18:55

General

  • Target

    NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe

  • Size

    192KB

  • MD5

    8cf4f6b238457c45f099927720f93ca0

  • SHA1

    acf6e94c19b9a726de0b29877da21a28013a3135

  • SHA256

    c1f11ec52c21b16193bbd3769b086f916bb8ce3719cb63e5adcad59a8efec181

  • SHA512

    2d3988a81abf7d145abc40ac1b20220ae821596a4de95dcd9a82f43c8fd389344672c7df023d6d64deeed444281b6bf364913a219a9e26077ba75a4b1235a7e0

  • SSDEEP

    6144:eZdH9b5/Keg7tkqxrqLckP+xn0YOBI+AG0TG0Ahuhuf:eTdcB7DrVkP+xnXOBI+AM0Guu

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.8cf4f6b238457c45f099927720f93ca0_JC.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\bugMAKER.bat
      2⤵
        PID:1068

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\bugMAKER.bat

      Filesize

      84B

      MD5

      4617ac698be443850252be4845be5ae4

      SHA1

      6a59e983396a34f225d36fba6acaf2765879c515

      SHA256

      17901f1e827e9f3f304ff690fa9fe6c89016297cc404f6af9883a853adf6f249

      SHA512

      a81189c41d50508a34b9e03bf0412335ef69142894470e49ae732f8d19d78149fe61814de5ddd465cc443e857afa91a6e535ffc82ab2eda22e5c9f884e11658f

    • C:\Windows\bugMAKER.bat

      Filesize

      84B

      MD5

      4617ac698be443850252be4845be5ae4

      SHA1

      6a59e983396a34f225d36fba6acaf2765879c515

      SHA256

      17901f1e827e9f3f304ff690fa9fe6c89016297cc404f6af9883a853adf6f249

      SHA512

      a81189c41d50508a34b9e03bf0412335ef69142894470e49ae732f8d19d78149fe61814de5ddd465cc443e857afa91a6e535ffc82ab2eda22e5c9f884e11658f

    • memory/1068-64-0x0000000002300000-0x0000000002301000-memory.dmp

      Filesize

      4KB

    • memory/2104-4-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2104-5-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2104-69-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB