Analysis
-
max time kernel
154s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.909bf5bc8910784327d8235dab73d3d0_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.909bf5bc8910784327d8235dab73d3d0_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.909bf5bc8910784327d8235dab73d3d0_JC.exe
-
Size
73KB
-
MD5
909bf5bc8910784327d8235dab73d3d0
-
SHA1
3280e5dba08b09e1d7c862cfe00ef5113778ea76
-
SHA256
39ab6d5db45a5674c3a5e8de5f901d0914c60ef3df6504e9ae727b4e616190ac
-
SHA512
73c3b849473f933ab7fc8bc4c1edd1d3b6025f30d8ee72f41b76cae065f3c68d047736ae3dbd9068a6e509f874450cb66b9f7a6d4bf576cb1a8a133af70d8041
-
SSDEEP
1536:/Ao0zj2d6rnJYulBJnDQEEa1EfBE+1EC1p1E1aE1E1EEE1+BX1EE9h1EJvY1kwvR:/AoAliulHnDQEEa1EfBE+1EC1p1E1aEo
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3304 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 3304 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" NEAS.909bf5bc8910784327d8235dab73d3d0_JC.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe NEAS.909bf5bc8910784327d8235dab73d3d0_JC.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1976 wrote to memory of 3304 1976 NEAS.909bf5bc8910784327d8235dab73d3d0_JC.exe 83 PID 1976 wrote to memory of 3304 1976 NEAS.909bf5bc8910784327d8235dab73d3d0_JC.exe 83 PID 1976 wrote to memory of 3304 1976 NEAS.909bf5bc8910784327d8235dab73d3d0_JC.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.909bf5bc8910784327d8235dab73d3d0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.909bf5bc8910784327d8235dab73d3d0_JC.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:3304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD554d6a778b06e9c0367a3f000bfb7e7d6
SHA1c2c40830d3e5b2a6836c1627e4290bbe8445ccb2
SHA256df0a63055212143d0137a0b3cb482e90903c98ac283ea3a311404e2086cd25bc
SHA512751aedfbc919654c7f50ab9cba4cb7c4f49fdb2b9e607f898f88401cfc8de24e0d4f67ba9a9819fb30719a0f6e3edb168f713286a47aa3ff6e48d4291bb66557
-
Filesize
73KB
MD554d6a778b06e9c0367a3f000bfb7e7d6
SHA1c2c40830d3e5b2a6836c1627e4290bbe8445ccb2
SHA256df0a63055212143d0137a0b3cb482e90903c98ac283ea3a311404e2086cd25bc
SHA512751aedfbc919654c7f50ab9cba4cb7c4f49fdb2b9e607f898f88401cfc8de24e0d4f67ba9a9819fb30719a0f6e3edb168f713286a47aa3ff6e48d4291bb66557