Analysis

  • max time kernel
    142s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-10-2023 17:35

General

  • Target

    NEAS.4fbfb186d18a77465f278ff7f1d36f70_JC.exe

  • Size

    2.1MB

  • MD5

    4fbfb186d18a77465f278ff7f1d36f70

  • SHA1

    5bc654c911b14adae80d891de20802639f3072ae

  • SHA256

    469057f3f984d308aff5f53265254e9eecea725bf40d367548b3da6db91cb217

  • SHA512

    668c16c18bf2bc382fa956b8f8980834f316913b26329b16e9f6b0e4e68b3fd224c77a18761bc8128f5f80f3992c38d8c4a10879572eadd6dc1ea4826c5bf6a0

  • SSDEEP

    49152:/RQ6PAJc0i0idV1q4GuFEEvvfXKPLPtdc0SSzSgYv7/Xoe:/RDAe0gvXWPztXSzX/

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.4fbfb186d18a77465f278ff7f1d36f70_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.4fbfb186d18a77465f278ff7f1d36f70_JC.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:3244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

    Filesize

    2.1MB

    MD5

    4fbfb186d18a77465f278ff7f1d36f70

    SHA1

    5bc654c911b14adae80d891de20802639f3072ae

    SHA256

    469057f3f984d308aff5f53265254e9eecea725bf40d367548b3da6db91cb217

    SHA512

    668c16c18bf2bc382fa956b8f8980834f316913b26329b16e9f6b0e4e68b3fd224c77a18761bc8128f5f80f3992c38d8c4a10879572eadd6dc1ea4826c5bf6a0

  • memory/3244-83-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/3244-82-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/3244-19-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/3244-79-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/3244-84-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/3244-81-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/3244-18-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/3244-0-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/3244-80-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/3244-85-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/3244-86-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/3244-87-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/3244-88-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/3244-89-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/3244-90-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/3244-91-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB