Analysis

  • max time kernel
    151s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    22/10/2023, 14:03

General

  • Target

    NEAS.16b3d570258918d02abe6719f41b71f0_JC.exe

  • Size

    100KB

  • MD5

    16b3d570258918d02abe6719f41b71f0

  • SHA1

    0f4979919e54e60319ad0ee87126b2ea8b0bde48

  • SHA256

    97c1090c561faa9c4eb1a468af9034aca8b6197f983845078e4adeeeec620412

  • SHA512

    7c70e4b10eff2d4858026f898574752c6577afe759dab46231d7ce816ce18fa6d6a9315a3ff565d5c2264f4a138324aa386cea4900ffcd6ad7f9c2151b704475

  • SSDEEP

    1536:3iWlcX220mQ/oexJKIRGWcOUP7vXArnY1ZqAefzyeshNIjnZZ:ypQ/mNAfzyemCnb

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.16b3d570258918d02abe6719f41b71f0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.16b3d570258918d02abe6719f41b71f0_JC.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Admin\jkfow.exe
      "C:\Users\Admin\jkfow.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\jkfow.exe

    Filesize

    100KB

    MD5

    d14cdacd8fb4770a32eb6387a0a0cf45

    SHA1

    9fb8a8e6890ea08009a9939cce86d13e1cab68c4

    SHA256

    8035d04f0fa1044218229322f99fba52e3d3673cf77cf31e9b0a3978cf1d022a

    SHA512

    2cf39e318ae40ac70e8154f1ededd6d2f9fdc0b9de5f04bc71cd07b0e60d84c917eb7bbc8cbf430db5dc2c7ffc5895ea7e952028bf22df134767adab4ff4785d

  • C:\Users\Admin\jkfow.exe

    Filesize

    100KB

    MD5

    d14cdacd8fb4770a32eb6387a0a0cf45

    SHA1

    9fb8a8e6890ea08009a9939cce86d13e1cab68c4

    SHA256

    8035d04f0fa1044218229322f99fba52e3d3673cf77cf31e9b0a3978cf1d022a

    SHA512

    2cf39e318ae40ac70e8154f1ededd6d2f9fdc0b9de5f04bc71cd07b0e60d84c917eb7bbc8cbf430db5dc2c7ffc5895ea7e952028bf22df134767adab4ff4785d

  • C:\Users\Admin\jkfow.exe

    Filesize

    100KB

    MD5

    d14cdacd8fb4770a32eb6387a0a0cf45

    SHA1

    9fb8a8e6890ea08009a9939cce86d13e1cab68c4

    SHA256

    8035d04f0fa1044218229322f99fba52e3d3673cf77cf31e9b0a3978cf1d022a

    SHA512

    2cf39e318ae40ac70e8154f1ededd6d2f9fdc0b9de5f04bc71cd07b0e60d84c917eb7bbc8cbf430db5dc2c7ffc5895ea7e952028bf22df134767adab4ff4785d

  • \Users\Admin\jkfow.exe

    Filesize

    100KB

    MD5

    d14cdacd8fb4770a32eb6387a0a0cf45

    SHA1

    9fb8a8e6890ea08009a9939cce86d13e1cab68c4

    SHA256

    8035d04f0fa1044218229322f99fba52e3d3673cf77cf31e9b0a3978cf1d022a

    SHA512

    2cf39e318ae40ac70e8154f1ededd6d2f9fdc0b9de5f04bc71cd07b0e60d84c917eb7bbc8cbf430db5dc2c7ffc5895ea7e952028bf22df134767adab4ff4785d

  • \Users\Admin\jkfow.exe

    Filesize

    100KB

    MD5

    d14cdacd8fb4770a32eb6387a0a0cf45

    SHA1

    9fb8a8e6890ea08009a9939cce86d13e1cab68c4

    SHA256

    8035d04f0fa1044218229322f99fba52e3d3673cf77cf31e9b0a3978cf1d022a

    SHA512

    2cf39e318ae40ac70e8154f1ededd6d2f9fdc0b9de5f04bc71cd07b0e60d84c917eb7bbc8cbf430db5dc2c7ffc5895ea7e952028bf22df134767adab4ff4785d

  • memory/1740-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1740-15-0x0000000002C10000-0x0000000002C3E000-memory.dmp

    Filesize

    184KB

  • memory/1740-9-0x0000000002C10000-0x0000000002C3E000-memory.dmp

    Filesize

    184KB

  • memory/1740-19-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3064-20-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB