Analysis

  • max time kernel
    13s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    31/10/2023, 15:27

General

  • Target

    NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe

  • Size

    266KB

  • MD5

    d2b62dfadc3da1a9439a7bd954e56600

  • SHA1

    45302dfc530052b3e4e2a8f532c9b0b65152e7d3

  • SHA256

    e5935c8a1fe8d5d5337b6948fd5ad516a415b723c10c1194a55bd73a7cf3b490

  • SHA512

    8f87b32487146a85f302b27cfbf53932a5b24d9452daf28e02b790aa75c28f6aa5538e72786e0dede15c1841194f8a98e9bb3059a15c234d5b94cd03fceddb44

  • SSDEEP

    3072:WcX93xwq19gL2SjGojCJa79TBfsY5vXWqvuHcYnLzqP2i:WcNhJgX9z9TB0YRX8n8

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1828
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1264
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev3E86.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Users\Admin\AppData\Local\Temp\NEAS.D2B62DFADC3DA1A9439A7BD954E56600_JC.EXE
        3⤵
        • Executes dropped EXE
        PID:3064
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev3E86.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.D2B62DFADC3DA1A9439A7BD954E56600_JC.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\NEAS.D2B62DFADC3DA1A9439A7BD954E56600_JC.EXE

    Filesize

    266KB

    MD5

    78dddc82ce37608599c102c28dbbeb41

    SHA1

    7e008e0c1135631b2c37528fe9a82dea10b473dc

    SHA256

    5bb5894260dbb11d15aa80d53931df91314bb53e805cc0b4160eb7161c79b499

    SHA512

    704f783254bcadab8f369e10700adfa89f81d14a89753e1a1ef2a079be8313ace3879c0c336d8151c771b0ca89a69728e78659bebd69bde2a22750623d1a4f76

  • C:\Users\Admin\AppData\Local\Temp\NEAS.D2B62DFADC3DA1A9439A7BD954E56600_JC.EXE

    Filesize

    266KB

    MD5

    78dddc82ce37608599c102c28dbbeb41

    SHA1

    7e008e0c1135631b2c37528fe9a82dea10b473dc

    SHA256

    5bb5894260dbb11d15aa80d53931df91314bb53e805cc0b4160eb7161c79b499

    SHA512

    704f783254bcadab8f369e10700adfa89f81d14a89753e1a1ef2a079be8313ace3879c0c336d8151c771b0ca89a69728e78659bebd69bde2a22750623d1a4f76

  • C:\Users\Admin\AppData\Local\Temp\NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe

    Filesize

    10KB

    MD5

    bf2411bc726873efb646f8b47f3e4efe

    SHA1

    225a0b4dc3a79bfaf8496a3185026b0a5340ea6b

    SHA256

    972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd

    SHA512

    fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2

  • C:\Users\Admin\AppData\Local\Temp\NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe

    Filesize

    10KB

    MD5

    bf2411bc726873efb646f8b47f3e4efe

    SHA1

    225a0b4dc3a79bfaf8496a3185026b0a5340ea6b

    SHA256

    972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd

    SHA512

    fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2

  • C:\WINDOWS\MSWDM.EXE

    Filesize

    256KB

    MD5

    8a1198209520897514a2d82a912a66d2

    SHA1

    5dda8ec47f948814d808cd71e89ebe65940a1ff7

    SHA256

    5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

    SHA512

    9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

  • C:\Windows\MSWDM.EXE

    Filesize

    256KB

    MD5

    8a1198209520897514a2d82a912a66d2

    SHA1

    5dda8ec47f948814d808cd71e89ebe65940a1ff7

    SHA256

    5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

    SHA512

    9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

  • C:\Windows\MSWDM.EXE

    Filesize

    256KB

    MD5

    8a1198209520897514a2d82a912a66d2

    SHA1

    5dda8ec47f948814d808cd71e89ebe65940a1ff7

    SHA256

    5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

    SHA512

    9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

  • C:\Windows\MSWDM.EXE

    Filesize

    256KB

    MD5

    8a1198209520897514a2d82a912a66d2

    SHA1

    5dda8ec47f948814d808cd71e89ebe65940a1ff7

    SHA256

    5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

    SHA512

    9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

  • C:\Windows\MSWDM.EXE

    Filesize

    256KB

    MD5

    8a1198209520897514a2d82a912a66d2

    SHA1

    5dda8ec47f948814d808cd71e89ebe65940a1ff7

    SHA256

    5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

    SHA512

    9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

  • C:\Windows\dev3E86.tmp

    Filesize

    10KB

    MD5

    bf2411bc726873efb646f8b47f3e4efe

    SHA1

    225a0b4dc3a79bfaf8496a3185026b0a5340ea6b

    SHA256

    972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd

    SHA512

    fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2

  • \Users\Admin\AppData\Local\Temp\NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe

    Filesize

    10KB

    MD5

    bf2411bc726873efb646f8b47f3e4efe

    SHA1

    225a0b4dc3a79bfaf8496a3185026b0a5340ea6b

    SHA256

    972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd

    SHA512

    fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2

  • \Users\Admin\AppData\Local\Temp\NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe

    Filesize

    10KB

    MD5

    bf2411bc726873efb646f8b47f3e4efe

    SHA1

    225a0b4dc3a79bfaf8496a3185026b0a5340ea6b

    SHA256

    972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd

    SHA512

    fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2

  • memory/2796-23-0x00000000001B0000-0x00000000001B5000-memory.dmp

    Filesize

    20KB

  • memory/2796-22-0x00000000001B0000-0x00000000001B5000-memory.dmp

    Filesize

    20KB

  • memory/3064-24-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB