Analysis
-
max time kernel
151s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
22/10/2023, 13:16
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.3dbddea75aa0f21e490b51538dc1d5d0_JC.exe
Resource
win7-20230831-en
General
-
Target
NEAS.3dbddea75aa0f21e490b51538dc1d5d0_JC.exe
-
Size
339KB
-
MD5
3dbddea75aa0f21e490b51538dc1d5d0
-
SHA1
4b28cb6bfcd8914325a473d720ea6244aa946d41
-
SHA256
1119cda583a445dc6ec12767df0efc2e119bfcf9367623583ae2bd13039a6989
-
SHA512
e99e4926569b396b10442527e6637e94ffef777f08f8a7446d29d9ad8fd43351dc87b0dc5a3754b7ca3398d0d23f4c2a733907fc4ab51aeb1558543ea405592d
-
SSDEEP
6144:6/Jj/pZKIAg6Na/VuOL9cHMrEHLSKJNAximK1AgwkQSiLytkfOeFQdWYbp:6/NRYzNa/V7AWEHLS2uiVchfUkfhuWYl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2416 7D5A.tmp -
Loads dropped DLL 2 IoCs
pid Process 2044 NEAS.3dbddea75aa0f21e490b51538dc1d5d0_JC.exe 2044 NEAS.3dbddea75aa0f21e490b51538dc1d5d0_JC.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE 7D5A.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACEXBE.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GKExcel.dll 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHEV.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WWLIB.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe 7D5A.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\PPKLite.api 7D5A.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\MSOSV.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXSEC32.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLACCT.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\RTFHTML.DLL 7D5A.tmp File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\cryptocme2.dll 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IPEDITOR.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OISGRAPH.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONPPTAddin.dll 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OWSCLT.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\EXP_PDF.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SSGEN.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\OLJRNL.FAE 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLFLTR.DLL 7D5A.tmp File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Onix32.dll 7D5A.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Search5.api 7D5A.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOSYNC.EXE 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSRTEDIT.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Wordcnv.dll 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1033\MSGR3EN.DLL 7D5A.tmp File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\JP2KLib.dll 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\OLMAIL.FAE 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\PAB.SAM 7D5A.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\ITIRCL55.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCVDT.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GKWord.dll 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NAMECONTROLSERVER.EXE 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNoteSyncPC.dll 7D5A.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe 7D5A.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DBGHELP.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\MSCONV97.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOLoader.dll 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCDDSF.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONBttnPPT.dll 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONBttnWD.dll 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPCORE.DLL 7D5A.tmp File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\vdk150.dll 7D5A.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\AUMProduct.aup 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\DBGHELP.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDCAT.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SOA.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\sqlite.dll 7D5A.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACER3X.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACEREP.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SETLANG.EXE 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Library\Analysis\ANALYS32.XLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSHY7EN.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSSP7ES.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\MSADDNDR.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\weblink.api 7D5A.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\FBIBLIO.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\FPSRVUTL.DLL 7D5A.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCDDS.DLL 7D5A.tmp -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\assembly\GAC_32\PresentationCore\3.0.0.0__31bf3856ad364e35\wpfgfx_v0300.dll 7D5A.tmp File created C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll 7D5A.tmp File created C:\Windows\assembly\GAC_32\System.Data.OracleClient\2.0.0.0__b77a5c561934e089\System.Data.OracleClient.dll 7D5A.tmp -
Program crash 1 IoCs
pid pid_target Process procid_target 2576 2044 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2416 2044 NEAS.3dbddea75aa0f21e490b51538dc1d5d0_JC.exe 28 PID 2044 wrote to memory of 2416 2044 NEAS.3dbddea75aa0f21e490b51538dc1d5d0_JC.exe 28 PID 2044 wrote to memory of 2416 2044 NEAS.3dbddea75aa0f21e490b51538dc1d5d0_JC.exe 28 PID 2044 wrote to memory of 2416 2044 NEAS.3dbddea75aa0f21e490b51538dc1d5d0_JC.exe 28 PID 2044 wrote to memory of 2576 2044 NEAS.3dbddea75aa0f21e490b51538dc1d5d0_JC.exe 29 PID 2044 wrote to memory of 2576 2044 NEAS.3dbddea75aa0f21e490b51538dc1d5d0_JC.exe 29 PID 2044 wrote to memory of 2576 2044 NEAS.3dbddea75aa0f21e490b51538dc1d5d0_JC.exe 29 PID 2044 wrote to memory of 2576 2044 NEAS.3dbddea75aa0f21e490b51538dc1d5d0_JC.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.3dbddea75aa0f21e490b51538dc1d5d0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.3dbddea75aa0f21e490b51538dc1d5d0_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\7D5A.tmpC:\Users\Admin\AppData\Local\Temp\7D5A.tmp2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
PID:2416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 1762⤵
- Program crash
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666