Analysis

  • max time kernel
    131s
  • max time network
    200s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-10-2023 14:42

General

  • Target

    NEAS.ce1f6ab3a18386d9903d2abb6d50493b_JC.exe

  • Size

    95KB

  • MD5

    ce1f6ab3a18386d9903d2abb6d50493b

  • SHA1

    a55b1857348952d9a3e42dc6e5fe9e8ae3ac5a99

  • SHA256

    9df4188f51437b7e1d18796f22d21a8b05bc911be05d365acfad847ce7d21f6d

  • SHA512

    985905ae5ef14d4d4f32de1646ef16a089eb38536ded7c3e35f4eea8a2784ae478deb2a9f66fbaba77ebf6bba1cbbcd1e4fdceab18d3e316da21981528ac73f8

  • SSDEEP

    1536:VUIiCg2g1Dl+alQ+0aLzHeGIxhcRQr1rRVRoRch1dROrwpOudRirVtFsrTpMGQYO:OX3fQa0l3xhceFTWM1dQrTOwZtFKnO

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in System32 directory 21 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.ce1f6ab3a18386d9903d2abb6d50493b_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.ce1f6ab3a18386d9903d2abb6d50493b_JC.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4888
    • C:\Windows\SysWOW64\Qckfid32.exe
      C:\Windows\system32\Qckfid32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1196
      • C:\Windows\SysWOW64\Qelcamcj.exe
        C:\Windows\system32\Qelcamcj.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1580
        • C:\Windows\SysWOW64\Qkfkng32.exe
          C:\Windows\system32\Qkfkng32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4428
          • C:\Windows\SysWOW64\Aflpkpjm.exe
            C:\Windows\system32\Aflpkpjm.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:4684
            • C:\Windows\SysWOW64\Amfhgj32.exe
              C:\Windows\system32\Amfhgj32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:5096
              • C:\Windows\SysWOW64\Abcppq32.exe
                C:\Windows\system32\Abcppq32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:408
                • C:\Windows\SysWOW64\Amhdmi32.exe
                  C:\Windows\system32\Amhdmi32.exe
                  8⤵
                  • Executes dropped EXE
                  PID:704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Abcppq32.exe

    Filesize

    95KB

    MD5

    f906f204f0f88ac5cfdc032325702777

    SHA1

    0a08ab4388c36f374d79ca763d603ea04d003320

    SHA256

    6f0d5a1a44928482ed5d5e50de4f8f518c2f790bfc2ba7876735f6602da0b8ca

    SHA512

    651109a0855ce97dec21b2bbb3c16a2ebe760b449283c4ef886888f78107c4b9f7ef5b2b0dbdf70ee2c4d48b45d3645f8a45087448327a0e266e2279d63dc610

  • C:\Windows\SysWOW64\Abcppq32.exe

    Filesize

    95KB

    MD5

    f906f204f0f88ac5cfdc032325702777

    SHA1

    0a08ab4388c36f374d79ca763d603ea04d003320

    SHA256

    6f0d5a1a44928482ed5d5e50de4f8f518c2f790bfc2ba7876735f6602da0b8ca

    SHA512

    651109a0855ce97dec21b2bbb3c16a2ebe760b449283c4ef886888f78107c4b9f7ef5b2b0dbdf70ee2c4d48b45d3645f8a45087448327a0e266e2279d63dc610

  • C:\Windows\SysWOW64\Aflpkpjm.exe

    Filesize

    95KB

    MD5

    abe0c693e486270f3d130a1347608a44

    SHA1

    8911c70a82ce5eb25df2253fbeb16c686a154986

    SHA256

    40a74a4f3a34fb80b8a52947e87179828187203f992054e5a8c28d4dbcdf31e8

    SHA512

    a250e3083d863509ef2db34d976f994de2f532955826bcace10466e1d495efa3d373fad5ba4d103b1a58cb180395b4ae45776dd55362738634fdaf1cf4b46162

  • C:\Windows\SysWOW64\Aflpkpjm.exe

    Filesize

    95KB

    MD5

    abe0c693e486270f3d130a1347608a44

    SHA1

    8911c70a82ce5eb25df2253fbeb16c686a154986

    SHA256

    40a74a4f3a34fb80b8a52947e87179828187203f992054e5a8c28d4dbcdf31e8

    SHA512

    a250e3083d863509ef2db34d976f994de2f532955826bcace10466e1d495efa3d373fad5ba4d103b1a58cb180395b4ae45776dd55362738634fdaf1cf4b46162

  • C:\Windows\SysWOW64\Amfhgj32.exe

    Filesize

    95KB

    MD5

    79bd34a8be1d7fe1d53e73208efeecc3

    SHA1

    f0828de0f82608734c2bc4be54dd81b2cdf5eabc

    SHA256

    38b45773a7dde354f500251a0ade8a58e5e29d448d3e519e4c0206ece508e4d0

    SHA512

    c59f3abdebf68aebf62eb2559210c538e8e5569c607776eedd45e39d7cb8c7e981959efa9e7d6322d9a9ab4dd5aa7581a67ad118a625bcf97efe500ceda432ef

  • C:\Windows\SysWOW64\Amfhgj32.exe

    Filesize

    95KB

    MD5

    79bd34a8be1d7fe1d53e73208efeecc3

    SHA1

    f0828de0f82608734c2bc4be54dd81b2cdf5eabc

    SHA256

    38b45773a7dde354f500251a0ade8a58e5e29d448d3e519e4c0206ece508e4d0

    SHA512

    c59f3abdebf68aebf62eb2559210c538e8e5569c607776eedd45e39d7cb8c7e981959efa9e7d6322d9a9ab4dd5aa7581a67ad118a625bcf97efe500ceda432ef

  • C:\Windows\SysWOW64\Amhdmi32.exe

    Filesize

    95KB

    MD5

    05addd7f7e9f43b978177b22b7f5b086

    SHA1

    0008981e95b97bc2579d8be0e3c6dab816a8e86d

    SHA256

    3852c80981f9328b2fcc98eeddbf2f57ecd045104713c6993bf36d68f2e08a65

    SHA512

    7971c832e6eabc3ed226bd72cf564f5c6818f13e0e297e52c15fb29dede5aee6eb59ded5e5b0a5b1a8a7ce9197f9b0e5e6f934cb0feb3a6693f646a5c64b681b

  • C:\Windows\SysWOW64\Amhdmi32.exe

    Filesize

    95KB

    MD5

    05addd7f7e9f43b978177b22b7f5b086

    SHA1

    0008981e95b97bc2579d8be0e3c6dab816a8e86d

    SHA256

    3852c80981f9328b2fcc98eeddbf2f57ecd045104713c6993bf36d68f2e08a65

    SHA512

    7971c832e6eabc3ed226bd72cf564f5c6818f13e0e297e52c15fb29dede5aee6eb59ded5e5b0a5b1a8a7ce9197f9b0e5e6f934cb0feb3a6693f646a5c64b681b

  • C:\Windows\SysWOW64\Gckjdhni.dll

    Filesize

    7KB

    MD5

    ea79cbd1bec0ef0a010b89c77ad5d66b

    SHA1

    636bae2a3dd3ca851cf5b686ca2348e063e9c770

    SHA256

    ecf31f9af67ebd1a4800239993710e62069133d56c688ef589e90008b8acf290

    SHA512

    9a1563790594b8f99384e17c9768a57b68b1039346f3d061cbf02fec234d5262246aa949e12f2e31cf374c1f0aaf56da0e36517cb5dc80faee20183b1012fe5a

  • C:\Windows\SysWOW64\Qckfid32.exe

    Filesize

    95KB

    MD5

    22635d4bf82438050844a7080a9bde62

    SHA1

    3347824e08bc434d1bf73767a322a93d27bc0d2b

    SHA256

    f49d342aedf211050d73b0898024075eed28eba71488ff2f3d7f3d18584a0e44

    SHA512

    ab94fd4152eebe723f5f86009515d9b6a0446638803c9eb1ef8034ed3f6d9d85ed2912a6c5da352a0248c6404dcc85a72e785847ab4511fdfe6bdb074e70e8b2

  • C:\Windows\SysWOW64\Qckfid32.exe

    Filesize

    95KB

    MD5

    22635d4bf82438050844a7080a9bde62

    SHA1

    3347824e08bc434d1bf73767a322a93d27bc0d2b

    SHA256

    f49d342aedf211050d73b0898024075eed28eba71488ff2f3d7f3d18584a0e44

    SHA512

    ab94fd4152eebe723f5f86009515d9b6a0446638803c9eb1ef8034ed3f6d9d85ed2912a6c5da352a0248c6404dcc85a72e785847ab4511fdfe6bdb074e70e8b2

  • C:\Windows\SysWOW64\Qelcamcj.exe

    Filesize

    95KB

    MD5

    3f7fcfe9902af9bf6e214bbc236e84d1

    SHA1

    d819dceb0ec9273dadc2a32f43780509ff0f911f

    SHA256

    700178e0b5dc4bc2c588d6805c1b64fc849cc5cfbcec519c81d06e3106842b13

    SHA512

    099f30eef49c995f89941e6d95f8b75c8a76fc1ebe5c5b1dccbbf56363d5c179cab0e55fca06a2ed77094952598587526f5121c5f40cf8564615e41240e5e472

  • C:\Windows\SysWOW64\Qelcamcj.exe

    Filesize

    95KB

    MD5

    3f7fcfe9902af9bf6e214bbc236e84d1

    SHA1

    d819dceb0ec9273dadc2a32f43780509ff0f911f

    SHA256

    700178e0b5dc4bc2c588d6805c1b64fc849cc5cfbcec519c81d06e3106842b13

    SHA512

    099f30eef49c995f89941e6d95f8b75c8a76fc1ebe5c5b1dccbbf56363d5c179cab0e55fca06a2ed77094952598587526f5121c5f40cf8564615e41240e5e472

  • C:\Windows\SysWOW64\Qkfkng32.exe

    Filesize

    95KB

    MD5

    57d2c5ca81a8dd750f3dcb52daa03713

    SHA1

    f01d232da2eb6a1b04861b5e62f600dd5c183beb

    SHA256

    ac5b057dc8420da19ba46538af711d45e6053d2777032dab590c53e7330fea2b

    SHA512

    1d289761e212b032ec850528c2f68c623345730d2f085faeef0ee672e6f3eb13646eb97c00ffd036094bb812f899c92a4481f8a2ae40e3d599dca73f9dbc89ac

  • C:\Windows\SysWOW64\Qkfkng32.exe

    Filesize

    95KB

    MD5

    57d2c5ca81a8dd750f3dcb52daa03713

    SHA1

    f01d232da2eb6a1b04861b5e62f600dd5c183beb

    SHA256

    ac5b057dc8420da19ba46538af711d45e6053d2777032dab590c53e7330fea2b

    SHA512

    1d289761e212b032ec850528c2f68c623345730d2f085faeef0ee672e6f3eb13646eb97c00ffd036094bb812f899c92a4481f8a2ae40e3d599dca73f9dbc89ac

  • memory/408-63-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/408-52-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/704-57-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/704-64-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/1196-58-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/1196-8-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/1580-59-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/1580-16-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/4428-60-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/4428-28-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/4684-61-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/4684-32-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/4888-48-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/4888-0-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/5096-62-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/5096-40-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB