Analysis

  • max time kernel
    133s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    23/10/2023, 18:11

General

  • Target

    NEAS.34e44df5d2f5cd40a5c4a0e31a7e55a0_JC.exe

  • Size

    87KB

  • MD5

    34e44df5d2f5cd40a5c4a0e31a7e55a0

  • SHA1

    4043f93aefbcc117217101674451db2e29120d9a

  • SHA256

    ef42e5797c89cbf91685918b028d927ff46d1f4858843fd153fe2e047702c051

  • SHA512

    25239e99892e0511c52874c23f9765a664fa7c3a83c832140f8301cd2a11caeaa10a5439c22a37128fc7bd9a422fb4a7cf0f29e44eaaaba2cba1cda0c7d2d1a3

  • SSDEEP

    1536:D7fPGykbOqjoHm4pICdfkLtAfupcWX50MxFY+yIOlnToIfNx5O:fq6+ouCpk2mpcWJ0r+QNTBfN

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.34e44df5d2f5cd40a5c4a0e31a7e55a0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.34e44df5d2f5cd40a5c4a0e31a7e55a0_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1564
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\65C5.tmp\65C6.tmp\65C7.bat C:\Users\Admin\AppData\Local\Temp\NEAS.34e44df5d2f5cd40a5c4a0e31a7e55a0_JC.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1548
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://www.facebook.com/login
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2148
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:2616
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:537602 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2612
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://www.youtube.com/
        3⤵
          PID:2596

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            32b99b740663c31a25db42d383d9a719

            SHA1

            5e1fdd380427f1011597aafd6d621e0dce970786

            SHA256

            b6d4fb7926e9985a7081d646688649d3d8b7291334bed81f4c24d1b00f8336ea

            SHA512

            315f2f20c8ece655d4ea9639e66b05494d760dd5395c1ca37d87a74fe6d3fa5289e4fb981ef97ef34c3f3c294de25cbb7f224a652481fd7c28866cca658bf4c1

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            32b99b740663c31a25db42d383d9a719

            SHA1

            5e1fdd380427f1011597aafd6d621e0dce970786

            SHA256

            b6d4fb7926e9985a7081d646688649d3d8b7291334bed81f4c24d1b00f8336ea

            SHA512

            315f2f20c8ece655d4ea9639e66b05494d760dd5395c1ca37d87a74fe6d3fa5289e4fb981ef97ef34c3f3c294de25cbb7f224a652481fd7c28866cca658bf4c1

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            7f46d14e1f319c141feca9e2bb9b9438

            SHA1

            bdea89e486b5525a5582e6168dad8b642e8a4743

            SHA256

            2409eb049ac4c79f6bec96945ef91e3d3c11617bdbc5c587c5cceefa1834440f

            SHA512

            b2fd023b8aa3d66aca21328e49c1ecfbc70ba190a90e862695251048274303c12b5f6564f7961344393601a23e986a8cb447a1b45bf82ceec735006d31edbbff

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            7f46d14e1f319c141feca9e2bb9b9438

            SHA1

            bdea89e486b5525a5582e6168dad8b642e8a4743

            SHA256

            2409eb049ac4c79f6bec96945ef91e3d3c11617bdbc5c587c5cceefa1834440f

            SHA512

            b2fd023b8aa3d66aca21328e49c1ecfbc70ba190a90e862695251048274303c12b5f6564f7961344393601a23e986a8cb447a1b45bf82ceec735006d31edbbff

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            6e57aa9a206f9ff30a20085e087a6d85

            SHA1

            d229fa3fcb4bda49668ec2d2751ea7d832620331

            SHA256

            eb849705d86ea5fc3d20bba94192197544f25378893d83664aea8c1436560b04

            SHA512

            59a5c0c90dcfa22e89de05d3d80a99eecccc4d097c350d2a28df0ab4c39923620dab9ec9247a15a304a0414f6e52fdd6f25ec337aefec30e857a63b89005da31

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            f676a587d8b6eb369a2e5802495285ca

            SHA1

            bf80769dacd78953e712902939badf2a03185520

            SHA256

            88c478d4b0d04efdb907d9ac94158f0046a0619b4997d10dd2cbd3848d4396ca

            SHA512

            5ed212abde078ab92ae4b35d63492f4df0a63ff1ad3502b75e91cc7b45d43bd1899ced54032b45350899a2f86f0e12436a07a2319846a6d9b4178b4540f79dc4

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            002ebeb5ab3948cf784e587b26dfd03c

            SHA1

            4534c1bc72a83ba0d315037f67bd727f83266def

            SHA256

            4841726ee5f365ec7c8f248f2bbdfa9b4a8bcce12ce0031152a1fd28dc6bad30

            SHA512

            9b82308e82b9b37a5545bc63a4637398c083ec31f77d42a2e714d586fa4a1f5e37096d314f656bdffb7ddd624c7425b5433f1f32ee6f0bcb7b40b96186887ab8

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            0ffaa46c3c034415d412e8930c37a2d1

            SHA1

            101570fc9b0685ab4d16047206c5afa5b97ba740

            SHA256

            e2952005c76afaed458172826e4c16a430c123711cc3a7f5791552e849ba360e

            SHA512

            66fccd63e3ba11f2bcfde6b427474992b3c40f95a569efc22aca86e8a9568da5ea1981c671c9b4eed8f7ec3cc3cdf8d091b4f69cdc4ae72442c9ead1ff300d48

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            b03e4ef9b2b140437e3d2cb8a148d567

            SHA1

            183fa2b96b21d8effdabbb6424d050b5960779f6

            SHA256

            672188842834ad395fab0072f3c8dd6d2d588b7c9f9bdc800d5638ec55a50eec

            SHA512

            5210531aa6516d070bdd5600356a9811d75f139a35b5044df4e8097ae8d57df7843a4377adff3fbbabd213e10567b633c385e22a7c9fa002bd339168f5a84924

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            a6fe23dcb21c3da7a5298acfc520b74f

            SHA1

            f5f78d5035be78fc63b06c6aca3a6ff3569434eb

            SHA256

            4d0d8e286927c7e8b2a382dad8c2bc557d00524fcc78e01426247003866a89b4

            SHA512

            80a03eb2a5a9d815ccd9855f573aa44731d92a3fcc8f78e0348d69d514cbc2fe293164d4f9bd82825c218050b62e2ad47d8bca96f3c62269797e24f5f7f74d54

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            bfcb78250104f2a214e5a8df9e774c13

            SHA1

            804b6222cb29de3b9e9d760b2e301d419f3011cd

            SHA256

            9322aba5681f280704f8adfc645d8d25bcf1a40f79c815f5c81782ad9a0b057f

            SHA512

            e6f1058bb82cca1c7c02df3ddb459425b0984503aa1f4ff1c2f656a5e9b9563371070a7b563a054f4ec5859f827e6db4ccb0134c0b8126a84cf716e5e2363fc2

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            3c95e80620db5e6b442f8d1c4eb47896

            SHA1

            d7bb035e16e7fbc03b873c5ca9bc8db4fc120c94

            SHA256

            abcdbb49004c7fac29ea565ee1f702a9ca85c25f8b5f4a941f0885c162bf7c50

            SHA512

            13fd95975e0ad884ba36c1f8ba053c2ede33c2ecf263dba721afee07b74cfef8838384a5a2708c12db024751fd6e7addd374354bce68c2a60942f8905f6f3ab4

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            f53578586febe12c8c5f9fd93394fe2b

            SHA1

            48d65f8e2e628831e3287177f55076240423f2fe

            SHA256

            36cc475749b496edacf822a3efd074adde8dd61b89cfdb3b6dbb0f1cf68ac8f7

            SHA512

            c2195388d5275bf980e5948241915f9469390cdf692cfb29795efaf316fb8fc8d038a0c65ee5ac01516a830c00c128855fea6c1334cac558fad30f9c7e98a45a

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_802691FEFBCBFDBC6638E7243774E081

            Filesize

            406B

            MD5

            7fb9bd1d13002ce602715935e4dbdc4e

            SHA1

            1b6eb82ba30c642d87b4460e7492b50047b071e1

            SHA256

            c49663bfedfdb9282d71d19c0dd606cae664356b0323ce7570c00c7ee1673d4b

            SHA512

            0900f86d9963157b9c83fda1ad1df79b45125cafaf8b0458e5cc66097234e356b8454d7ff31b9a4a83795e3cd6a826efe7f8917d57e44f6e7342cc36c764d695

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\h6i8x7q\imagestore.dat

            Filesize

            1KB

            MD5

            53bfa496619baaa7266db805471a5d7d

            SHA1

            50af5558926168d320a0ac7890419f819e70164b

            SHA256

            1227ec4c3b25b255b7d963bedc312b8006a3935fe4cca2d08d676ae26784ef84

            SHA512

            649207b3a3e6df71d61eb833470200495d727aa5777f2366e8d2a3325e6e5ef32324b1170b67022c141ec0e9de77b4ab38d4d6448f2321b979974eaf065590d3

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\h6i8x7q\imagestore.dat

            Filesize

            5KB

            MD5

            8cfb60eb2d33e8b1c3ba26cfd7784027

            SHA1

            b4099d89f323774cd8c760dc106be90a4113b175

            SHA256

            16c2ca82a5c73bcaaece53cb693c6aa01dd5b4437c3a7f562ab395374186c547

            SHA512

            d1518010a8db80f18e35d78f38443631f6488dc575c9e7fbefa78520fdd6c844374cb3061d7a30607a91a2c31e26140af551a8a6be2ab13b105d8635e777a4da

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CX2ABGL1\hLRJ1GG_y0J[1].ico

            Filesize

            4KB

            MD5

            8cddca427dae9b925e73432f8733e05a

            SHA1

            1999a6f624a25cfd938eef6492d34fdc4f55dedc

            SHA256

            89676a3fb8639d6531c525e5800ff4cc44d06d27ff5607922d27e390eb5b6e62

            SHA512

            20fbee2886995c253e762f2bb814ad16890b0989deab4d92394363ef0060b96a634d87c380c7ba1b787a8ab312be968fed9329a729b4e0d64235a09e397db740

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VSQV6XDQ\favicon[1].ico

            Filesize

            1KB

            MD5

            f2a495d85735b9a0ac65deb19c129985

            SHA1

            f2e22853e5da3e1017d5e1e319eeefe4f622e8c8

            SHA256

            8bb1d0fa43a17436d59dd546f6f74c76dc44735def7522c22d8031166db8911d

            SHA512

            6ca6a89de3fa98ca1efcf0b19b8a80420e023f38ed00f4496dc0f821cea23d24fb0992cee58c6d089f093fdefca42b60bb3a0a0b16c97b9862d75b269ae8463b

          • C:\Users\Admin\AppData\Local\Temp\65C5.tmp\65C6.tmp\65C7.bat

            Filesize

            124B

            MD5

            dec89e5682445d71376896eac0d62d8b

            SHA1

            c5ae3197d3c2faf3dea137719c804ab215022ea6

            SHA256

            c3dea90ca98985007f0de66bf0197fdcd2d4a35e365135bf37a18a4895d81668

            SHA512

            b746b79120d2ff8a9f3327b0bed99c70339155ea831c1eb9f412056fc8de36a0e3005378ba9102bd25ce6cc24fe1171f1a9c8453f33a9bcd6dd59e9ad0f8e186

          • C:\Users\Admin\AppData\Local\Temp\Cab6C6A.tmp

            Filesize

            61KB

            MD5

            f3441b8572aae8801c04f3060b550443

            SHA1

            4ef0a35436125d6821831ef36c28ffaf196cda15

            SHA256

            6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

            SHA512

            5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

          • C:\Users\Admin\AppData\Local\Temp\Tar6D49.tmp

            Filesize

            163KB

            MD5

            9441737383d21192400eca82fda910ec

            SHA1

            725e0d606a4fc9ba44aa8ffde65bed15e65367e4

            SHA256

            bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

            SHA512

            7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\V2NUETTT.txt

            Filesize

            278B

            MD5

            2d5856c4c1a3af50a9b23ec4b8cb8e78

            SHA1

            89d770162de7d5cba1eb85c7522e0801e2ad9e16

            SHA256

            dc13770738bc21055cee0b6e6ee5d4404b7a2d58a5e6c52e72f22207e945a781

            SHA512

            711d129aafe81ae82dedfd2f14bbf955f85e3a587e7ea077dd1dac6353dc5e5844f75832d3bb21ddc70509888f55144c4b7f1a52d526a7c5e14dc8272b657162