Analysis

  • max time kernel
    141s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/10/2023, 18:00

General

  • Target

    NEAS.562594d5c4f0a7fe5bd48cdbad585050_JC.exe

  • Size

    216KB

  • MD5

    562594d5c4f0a7fe5bd48cdbad585050

  • SHA1

    88554faa3e3314e21a6396b8fa012aadc7f14add

  • SHA256

    bd33062b4fd4f83a84ca61fb3386643b0162f1cf9fbe3732ccd44a4ec9c48391

  • SHA512

    befc9cc877d07e2032441719b4c5c2cac210cdf6d09c322813316e31f4bbd55183fee8569cd3147dfb4093db8de6a9a8a8f767c228195af8acd4e4c269b12cba

  • SSDEEP

    6144:vlH4Ghfbq2BeK9mequ924H2xvZDD+UZ9fJoSfsdRgVhzFNHSi2:tffbJM2lqu9zH2TbJHHDHd2

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.562594d5c4f0a7fe5bd48cdbad585050_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.562594d5c4f0a7fe5bd48cdbad585050_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FD2C.tmp\vir.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2876
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save NEAS.562594d5c4f0a7fe5bd48cdbad585050_JC.exe.com -include s.dll -overwrite -nodelete
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2960
        • C:\Users\Admin\AppData\Local\Temp\FF20.tmp\mpress.exe
          "C:\Users\Admin\AppData\Local\Temp\FF20.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exeFF21.tmp"
          4⤵
          • Executes dropped EXE
          PID:4868
      • C:\Windows\SysWOW64\calc.exe
        CALC.EXE
        3⤵
        • Modifies registry class
        PID:3160
      • C:\Windows\SysWOW64\calc.exe
        CALC.EXE
        3⤵
        • Modifies registry class
        PID:4916
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1640
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4388

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\FD2C.tmp\vir.bat

    Filesize

    1KB

    MD5

    c00abd85108be058aacfd91502257864

    SHA1

    3cba5f3acbfc7099f9bf35accd9b990ba7adb5a1

    SHA256

    d459de733153232f8f9888851c147ad17c820e3c4b5614d8ed4cecafb5217463

    SHA512

    742b8a48438c599d723a12856d8acf79c7942595a46e2b2af48c42fff9859d42554439e9333aa897a0993b73567fcd55b8b5da9f573331e1084a5b709ed942e2

  • C:\Users\Admin\AppData\Local\Temp\FF20.tmp\mpress.exe

    Filesize

    100KB

    MD5

    e42b81b9636152c78ba480c1c47d3c7f

    SHA1

    66a2fca3925428ee91ad9df5b76b90b34d28e0f8

    SHA256

    7c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2

    SHA512

    4b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e

  • C:\Users\Admin\AppData\Local\Temp\FF20.tmp\mpress.exe

    Filesize

    100KB

    MD5

    e42b81b9636152c78ba480c1c47d3c7f

    SHA1

    66a2fca3925428ee91ad9df5b76b90b34d28e0f8

    SHA256

    7c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2

    SHA512

    4b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e

  • C:\Users\Admin\AppData\Local\Temp\exeFF21.tmp

    Filesize

    41KB

    MD5

    5a16fb75977e1799ed52f35a164922e6

    SHA1

    c1697c61c42498f0501a886392ddd2560646b24c

    SHA256

    f625375b30e87216e720919833d9d4e7bc11f0b61a9d2d218817d2ebb140d7de

    SHA512

    1e31f17c0fea7df5bd321ff0015b8226a378b649c43df1111d9467b0f86f3a14e5a7ae9ed00314695f688b7cc0c18e44b3fa6521a8fea5943e4eb9a69a612216

  • C:\Users\Admin\AppData\Local\Temp\exeFF21.tmp

    Filesize

    41KB

    MD5

    5a16fb75977e1799ed52f35a164922e6

    SHA1

    c1697c61c42498f0501a886392ddd2560646b24c

    SHA256

    f625375b30e87216e720919833d9d4e7bc11f0b61a9d2d218817d2ebb140d7de

    SHA512

    1e31f17c0fea7df5bd321ff0015b8226a378b649c43df1111d9467b0f86f3a14e5a7ae9ed00314695f688b7cc0c18e44b3fa6521a8fea5943e4eb9a69a612216

  • C:\Users\Admin\AppData\Local\Temp\exeFF21.tmp

    Filesize

    24KB

    MD5

    e6463306e4c9e1869c45c0433ea1eb4b

    SHA1

    33512256446775a16d9ec37c2ffbf1c181bbcea6

    SHA256

    c06e36b469862896e2c897a6c5d62904001de12be848452d77aedc560c2630aa

    SHA512

    a1fb58a92a6a57b166092cae0898937d652ea1f0f555f4829094d5efb7cd4763890ce76e35923ebbef6b3981b5565e0feae2484543f38ef999d6f22fc67bb589

  • C:\Users\Admin\AppData\Local\Temp\mpr172.tmp

    Filesize

    24KB

    MD5

    e6463306e4c9e1869c45c0433ea1eb4b

    SHA1

    33512256446775a16d9ec37c2ffbf1c181bbcea6

    SHA256

    c06e36b469862896e2c897a6c5d62904001de12be848452d77aedc560c2630aa

    SHA512

    a1fb58a92a6a57b166092cae0898937d652ea1f0f555f4829094d5efb7cd4763890ce76e35923ebbef6b3981b5565e0feae2484543f38ef999d6f22fc67bb589

  • C:\Users\Admin\AppData\Local\Temp\s.dll

    Filesize

    700KB

    MD5

    863c312b1e74b57dc2d01a1370684ff3

    SHA1

    39175536b2783f4b3d70cb29d3352388cfebbcac

    SHA256

    33c2b1a19a8b31cd969ee88acebba54c9af73d4a8633becfa609e067909db33a

    SHA512

    d6dcd4968bd18b3483f7fb6a63b9640d8d3f3fc63bccd5c0ba294c1f09fc9b6bcb4fae815682d5800f7acf34fdadd2ec54be7d728d754a46b9cdb2362b3fa76d

  • C:\Users\Admin\AppData\Local\Temp\u.dll

    Filesize

    700KB

    MD5

    863c312b1e74b57dc2d01a1370684ff3

    SHA1

    39175536b2783f4b3d70cb29d3352388cfebbcac

    SHA256

    33c2b1a19a8b31cd969ee88acebba54c9af73d4a8633becfa609e067909db33a

    SHA512

    d6dcd4968bd18b3483f7fb6a63b9640d8d3f3fc63bccd5c0ba294c1f09fc9b6bcb4fae815682d5800f7acf34fdadd2ec54be7d728d754a46b9cdb2362b3fa76d

  • C:\Users\Admin\AppData\Local\Temp\u.dll

    Filesize

    700KB

    MD5

    863c312b1e74b57dc2d01a1370684ff3

    SHA1

    39175536b2783f4b3d70cb29d3352388cfebbcac

    SHA256

    33c2b1a19a8b31cd969ee88acebba54c9af73d4a8633becfa609e067909db33a

    SHA512

    d6dcd4968bd18b3483f7fb6a63b9640d8d3f3fc63bccd5c0ba294c1f09fc9b6bcb4fae815682d5800f7acf34fdadd2ec54be7d728d754a46b9cdb2362b3fa76d

  • C:\Users\Admin\AppData\Local\Temp\u.dll

    Filesize

    700KB

    MD5

    863c312b1e74b57dc2d01a1370684ff3

    SHA1

    39175536b2783f4b3d70cb29d3352388cfebbcac

    SHA256

    33c2b1a19a8b31cd969ee88acebba54c9af73d4a8633becfa609e067909db33a

    SHA512

    d6dcd4968bd18b3483f7fb6a63b9640d8d3f3fc63bccd5c0ba294c1f09fc9b6bcb4fae815682d5800f7acf34fdadd2ec54be7d728d754a46b9cdb2362b3fa76d

  • C:\Users\Admin\AppData\Local\Temp\vir.bat

    Filesize

    1KB

    MD5

    f6007c105222cd5ac1ade29a117be5ba

    SHA1

    b7522cfff44ca03dbfe1e5067575727de21de7ef

    SHA256

    b5bf7b6f9f4b8958120aa27d9e2cd823b80f4ef223b3bf6f8a699bf8675f6516

    SHA512

    f033f9a7b9b1684bcd77bee8a58928f8c47867a85f487e447a028a2e98bd8844bb168afb6447f20b937c6588f47fc781a2a99a03bbb6fe065f5a2d9329ee8c37

  • memory/2044-1-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2044-0-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2044-71-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/4868-55-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/4868-63-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB