Analysis
-
max time kernel
143s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2023 16:13
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.4397de36f5d4a6628c689050de2509e0_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.4397de36f5d4a6628c689050de2509e0_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.4397de36f5d4a6628c689050de2509e0_JC.exe
-
Size
66KB
-
MD5
4397de36f5d4a6628c689050de2509e0
-
SHA1
54e1806a4fa620493cc65aeea4c944120f7e4e01
-
SHA256
3d6f8167c4ff4ebbb9b41c62943ff1304ac3133d458c7b2273443d12e0455320
-
SHA512
e21d607c45a5e5d7a564c36dbef4bb172382ded645ceebeed16785f20d104d824df28f6e1427e1f330f29fe27768bfde2950574e05d05ebe306426f8f00a4081
-
SSDEEP
1536:NDj2d6rnJbJnJBSX1nV1b1N1Il1k1YFI1x1J1MuEqx517Q/1T1Jzct01Nsqnl1Rf:FlnnJBSX1nV1b1N1Il1k1YFI1x1J1MuY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3692 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 3692 microsofthelp.exe -
Loads dropped DLL 1 IoCs
pid Process 3692 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" NEAS.4397de36f5d4a6628c689050de2509e0_JC.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe NEAS.4397de36f5d4a6628c689050de2509e0_JC.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3692 microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3780 wrote to memory of 3692 3780 NEAS.4397de36f5d4a6628c689050de2509e0_JC.exe 86 PID 3780 wrote to memory of 3692 3780 NEAS.4397de36f5d4a6628c689050de2509e0_JC.exe 86 PID 3780 wrote to memory of 3692 3780 NEAS.4397de36f5d4a6628c689050de2509e0_JC.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.4397de36f5d4a6628c689050de2509e0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.4397de36f5d4a6628c689050de2509e0_JC.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:3692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD54c0b9970f96300dfa1f45afc7539d35f
SHA1ebbb4ed2003662d78d1f32e7b6da1b6f504ae711
SHA2564e96660cc8be7171a79755a20860366987547322b3a809e78c9850f14c242262
SHA512579f8787b52bf62a0296d8a24753263201fbc84abec5927033e3c97576f965ead0f8422acd3f7af1345b0df0001b0cd68fa971062e21269f6940cf3e1508ca88
-
Filesize
66KB
MD5c0988cb600ce84bbfa02ed479b311426
SHA13bd026808ce7d53666128fe5c6de27829fe68955
SHA2567ad13bd1b4d244e20453d8a7611c6fb93acc619362bb69078045f89801842be6
SHA5128ce7ac20ed8144e678fefc98e12aa5fae71b4d5ced13b84ee57b818d0ed1beef6bee775d5fa4b59d1bf312766ec081f8162f1e27cffd8f8ff95babe9181632e8
-
Filesize
66KB
MD5c0988cb600ce84bbfa02ed479b311426
SHA13bd026808ce7d53666128fe5c6de27829fe68955
SHA2567ad13bd1b4d244e20453d8a7611c6fb93acc619362bb69078045f89801842be6
SHA5128ce7ac20ed8144e678fefc98e12aa5fae71b4d5ced13b84ee57b818d0ed1beef6bee775d5fa4b59d1bf312766ec081f8162f1e27cffd8f8ff95babe9181632e8