Analysis

  • max time kernel
    136s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-10-2023 19:25

General

  • Target

    NEAS.42398a81ff5a8a7fe5036545a1583980_JC.exe

  • Size

    149KB

  • MD5

    42398a81ff5a8a7fe5036545a1583980

  • SHA1

    5c2bda50d5a73f2b389fdcf16fb3652529f36b87

  • SHA256

    eb4e5b39ab9c64959e19832e9479f81eeb8db636a812f70d23ac380a4799abbe

  • SHA512

    edb2c65cb4899d57a1be8a9d4826a0a937dc2b105e9aeb80e0cd15d23b90dd6f94c93aade331f4adcb6fa2b9bb2fff862c1c6208f8ec47a44f7d87d09a1b1d67

  • SSDEEP

    3072:J/BH9p/3K+AEkzgXrGqJM4qd3bGjhkqsXb6:JR9pTAEkz6rGq4Bbq2u

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.42398a81ff5a8a7fe5036545a1583980_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.42398a81ff5a8a7fe5036545a1583980_JC.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4796
  • C:\PROGRA~3\Mozilla\ecxnjia.exe
    C:\PROGRA~3\Mozilla\ecxnjia.exe -goglxbn
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:1936
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:4240
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3292

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PROGRA~3\Mozilla\ecxnjia.exe

      Filesize

      149KB

      MD5

      d1b937d61d32a7ae233a5005650e93f7

      SHA1

      d83ca298f5474673fcd38281c2efa04944ca07f6

      SHA256

      af1f2c5f056725c647f1a2552f4d1583861e60726c519bbebfcb3de9cd1b315d

      SHA512

      a5fd71c90a475bf9f28e858c487579bc9e056a819e13200c42d4844066a911d56a355a4021ecefe8dae691c4ce7563c75bfd575b838409179fd90a3d727a1490

    • C:\ProgramData\Mozilla\ecxnjia.exe

      Filesize

      149KB

      MD5

      d1b937d61d32a7ae233a5005650e93f7

      SHA1

      d83ca298f5474673fcd38281c2efa04944ca07f6

      SHA256

      af1f2c5f056725c647f1a2552f4d1583861e60726c519bbebfcb3de9cd1b315d

      SHA512

      a5fd71c90a475bf9f28e858c487579bc9e056a819e13200c42d4844066a911d56a355a4021ecefe8dae691c4ce7563c75bfd575b838409179fd90a3d727a1490

    • memory/1936-16-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1936-10-0x00000000005B0000-0x000000000060B000-memory.dmp

      Filesize

      364KB

    • memory/3292-17-0x000001AA5F940000-0x000001AA5F950000-memory.dmp

      Filesize

      64KB

    • memory/3292-33-0x000001AA5FA40000-0x000001AA5FA50000-memory.dmp

      Filesize

      64KB

    • memory/3292-49-0x000001AA67D40000-0x000001AA67D41000-memory.dmp

      Filesize

      4KB

    • memory/3292-51-0x000001AA67D70000-0x000001AA67D71000-memory.dmp

      Filesize

      4KB

    • memory/3292-52-0x000001AA67D70000-0x000001AA67D71000-memory.dmp

      Filesize

      4KB

    • memory/3292-53-0x000001AA67E80000-0x000001AA67E81000-memory.dmp

      Filesize

      4KB

    • memory/4796-1-0x0000000002190000-0x00000000021EB000-memory.dmp

      Filesize

      364KB

    • memory/4796-9-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4796-0-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB