Analysis
-
max time kernel
151s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2023 20:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.76b265b24aa1662ba9c0051068da11c0_JC.exe
Resource
win7-20231020-en
windows7-x64
3 signatures
150 seconds
General
-
Target
NEAS.76b265b24aa1662ba9c0051068da11c0_JC.exe
-
Size
6.5MB
-
MD5
76b265b24aa1662ba9c0051068da11c0
-
SHA1
5db9546faf0f8da703d02ad17765f6cda2ef89c4
-
SHA256
05c59a08729fd1bf54f815eb85d39c7d3815dc9d80b65c9d08b753f8891fe6db
-
SHA512
cd203ca17e227fb4cc4cf3fb9424e365edf0e4faf2aa9fe4ca71c8265b99afbf1fd2ebb6bd8254f774309ac99858dd310247f7ed2ad316154eb88a60e3f537c8
-
SSDEEP
196608:mdkkrmgC/BqfL+m7eSKSpE3cTrgP09ZcZ0j:7kr4sfCm7ergEkgPdq
Malware Config
Signatures
-
Detected Ploutus loader 34 IoCs
Processes:
resource yara_rule behavioral2/memory/2392-6-0x0000000007520000-0x0000000007EF4000-memory.dmp family_ploutus behavioral2/memory/2392-7-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-8-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-10-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-12-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-14-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-16-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-18-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-20-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-22-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-24-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-26-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-28-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-30-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-32-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-34-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-36-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-38-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-40-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-42-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-44-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-47-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-49-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-51-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-53-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-55-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-57-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-59-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-61-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-64-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-66-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-68-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-70-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus behavioral2/memory/2392-73-0x0000000007520000-0x0000000007EEF000-memory.dmp family_ploutus -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
NEAS.76b265b24aa1662ba9c0051068da11c0_JC.exedescription pid process Token: SeDebugPrivilege 2392 NEAS.76b265b24aa1662ba9c0051068da11c0_JC.exe