Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    01/11/2023, 10:55

General

  • Target

    NEAS.1806e4c68214f50122564570b071efa0_JC.exe

  • Size

    27KB

  • MD5

    1806e4c68214f50122564570b071efa0

  • SHA1

    5cb4f1078cd7aa1b58be574afeacd902b8d9514a

  • SHA256

    72c0145ace85c7a134f894b7f081b6d6dfa3a728ccadcb0b41780c7f9484e00c

  • SHA512

    2bcf20d90bce3760df9a397e75ef40c45f5f1ac108cb2c936186442d1d1607c09d5205380720f1038cf20c4ad201285f188ed94187c3ba3631ab5201cf386d25

  • SSDEEP

    384:Rjk/A6WET7A5tRIoTS/DdJjjXNHN1doc0lZoEbtxb1JZoZs2daBl1bQg1g:Rjk/A6WYBD3XvQcq9xHqZjk/g

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.1806e4c68214f50122564570b071efa0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.1806e4c68214f50122564570b071efa0_JC.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Windows\SysWOW64\NTdhcp.exe
      C:\Windows\system32\NTdhcp.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:2968
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\Deleteme.bat
      2⤵
      • Deletes itself
      PID:1944

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Deleteme.bat

    Filesize

    200B

    MD5

    c7eab2f6c4c1e9f81f3331010003a769

    SHA1

    4e86382952b0331db9404a3c9113fa985bc15f8d

    SHA256

    35239fe17029ccc601c01de121cbdc4d49d7e99f842498fb9e8500d9527dbdb0

    SHA512

    1701846a71426e14337daec905986ac526e1681ce493046365d615439551cec976351229641ff0eabd1180c92254dc37110a41d5c77fcfe0e6f7d9ce60ee6ad7

  • C:\Windows\Deleteme.bat

    Filesize

    200B

    MD5

    c7eab2f6c4c1e9f81f3331010003a769

    SHA1

    4e86382952b0331db9404a3c9113fa985bc15f8d

    SHA256

    35239fe17029ccc601c01de121cbdc4d49d7e99f842498fb9e8500d9527dbdb0

    SHA512

    1701846a71426e14337daec905986ac526e1681ce493046365d615439551cec976351229641ff0eabd1180c92254dc37110a41d5c77fcfe0e6f7d9ce60ee6ad7

  • C:\Windows\SysWOW64\NTdhcp.exe

    Filesize

    27KB

    MD5

    1806e4c68214f50122564570b071efa0

    SHA1

    5cb4f1078cd7aa1b58be574afeacd902b8d9514a

    SHA256

    72c0145ace85c7a134f894b7f081b6d6dfa3a728ccadcb0b41780c7f9484e00c

    SHA512

    2bcf20d90bce3760df9a397e75ef40c45f5f1ac108cb2c936186442d1d1607c09d5205380720f1038cf20c4ad201285f188ed94187c3ba3631ab5201cf386d25

  • C:\Windows\SysWOW64\NTdhcp.exe

    Filesize

    27KB

    MD5

    1806e4c68214f50122564570b071efa0

    SHA1

    5cb4f1078cd7aa1b58be574afeacd902b8d9514a

    SHA256

    72c0145ace85c7a134f894b7f081b6d6dfa3a728ccadcb0b41780c7f9484e00c

    SHA512

    2bcf20d90bce3760df9a397e75ef40c45f5f1ac108cb2c936186442d1d1607c09d5205380720f1038cf20c4ad201285f188ed94187c3ba3631ab5201cf386d25

  • C:\Windows\SysWOW64\NTdhcp.exe

    Filesize

    27KB

    MD5

    1806e4c68214f50122564570b071efa0

    SHA1

    5cb4f1078cd7aa1b58be574afeacd902b8d9514a

    SHA256

    72c0145ace85c7a134f894b7f081b6d6dfa3a728ccadcb0b41780c7f9484e00c

    SHA512

    2bcf20d90bce3760df9a397e75ef40c45f5f1ac108cb2c936186442d1d1607c09d5205380720f1038cf20c4ad201285f188ed94187c3ba3631ab5201cf386d25

  • \Windows\SysWOW64\NTdhcp.exe

    Filesize

    27KB

    MD5

    1806e4c68214f50122564570b071efa0

    SHA1

    5cb4f1078cd7aa1b58be574afeacd902b8d9514a

    SHA256

    72c0145ace85c7a134f894b7f081b6d6dfa3a728ccadcb0b41780c7f9484e00c

    SHA512

    2bcf20d90bce3760df9a397e75ef40c45f5f1ac108cb2c936186442d1d1607c09d5205380720f1038cf20c4ad201285f188ed94187c3ba3631ab5201cf386d25

  • \Windows\SysWOW64\NTdhcp.exe

    Filesize

    27KB

    MD5

    1806e4c68214f50122564570b071efa0

    SHA1

    5cb4f1078cd7aa1b58be574afeacd902b8d9514a

    SHA256

    72c0145ace85c7a134f894b7f081b6d6dfa3a728ccadcb0b41780c7f9484e00c

    SHA512

    2bcf20d90bce3760df9a397e75ef40c45f5f1ac108cb2c936186442d1d1607c09d5205380720f1038cf20c4ad201285f188ed94187c3ba3631ab5201cf386d25

  • memory/1720-11-0x0000000000220000-0x0000000000237000-memory.dmp

    Filesize

    92KB

  • memory/1720-0-0x0000000000400000-0x0000000000416200-memory.dmp

    Filesize

    88KB

  • memory/1720-4-0x0000000000220000-0x0000000000237000-memory.dmp

    Filesize

    92KB

  • memory/1720-21-0x0000000000400000-0x0000000000416200-memory.dmp

    Filesize

    88KB

  • memory/1720-23-0x0000000000220000-0x0000000000237000-memory.dmp

    Filesize

    92KB

  • memory/2968-14-0x0000000000400000-0x0000000000416200-memory.dmp

    Filesize

    88KB