Analysis
-
max time kernel
156s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2023 11:28
Behavioral task
behavioral1
Sample
NEAS.5299679c1fecd5f154bf07d4f32724a0_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.5299679c1fecd5f154bf07d4f32724a0_JC.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.5299679c1fecd5f154bf07d4f32724a0_JC.exe
-
Size
29KB
-
MD5
5299679c1fecd5f154bf07d4f32724a0
-
SHA1
f40bd09fe3f177a323bf3be58b86a4066782e5d2
-
SHA256
5e6c0427dbc2735d434e1a26a7a44384639e85c878c8bcb9ed47d97c12493d86
-
SHA512
2791c6fd4abb072ba7bf60722214707976cbfc61aa0539d90c794aa2ceed6c1fee15d30c3ae3f7482e4b416f925348543a60d4e6365a4eeb009c618e70d310e0
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/8S:AEwVs+0jNDY1qi/qv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4128 services.exe -
resource yara_rule behavioral2/memory/2324-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/files/0x0008000000022dbe-4.dat upx behavioral2/files/0x0008000000022dbe-7.dat upx behavioral2/memory/4128-6-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2324-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4128-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4128-16-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4128-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4128-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x0008000000022e05-36.dat upx behavioral2/memory/2324-86-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4128-87-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2324-122-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4128-123-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2324-168-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4128-169-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2324-240-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4128-241-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2324-289-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4128-294-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2324-325-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4128-335-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2324-371-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4128-378-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2324-415-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4128-416-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2324-465-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4128-466-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2324-501-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4128-502-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2324-544-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4128-545-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" NEAS.5299679c1fecd5f154bf07d4f32724a0_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe NEAS.5299679c1fecd5f154bf07d4f32724a0_JC.exe File opened for modification C:\Windows\java.exe NEAS.5299679c1fecd5f154bf07d4f32724a0_JC.exe File created C:\Windows\java.exe NEAS.5299679c1fecd5f154bf07d4f32724a0_JC.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2324 wrote to memory of 4128 2324 NEAS.5299679c1fecd5f154bf07d4f32724a0_JC.exe 86 PID 2324 wrote to memory of 4128 2324 NEAS.5299679c1fecd5f154bf07d4f32724a0_JC.exe 86 PID 2324 wrote to memory of 4128 2324 NEAS.5299679c1fecd5f154bf07d4f32724a0_JC.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5299679c1fecd5f154bf07d4f32724a0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5299679c1fecd5f154bf07d4f32724a0_JC.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
305B
MD532bebbd769b4d92e90eb2630815ab675
SHA1979095b7b8c81973a36be40187d14525973ca82f
SHA256109d8ca823dca724c4f32557a8057783a6fb755d67fc74cf9df004731c7c432b
SHA512784363cc3b020815ea603f60cf6478b4f973847f014f425f33012983209db48e2ef36a1a933b74adc644a4c1f8525a1cedd18682a18ff399187163b7706e50d5
-
Filesize
302B
MD551b86971925c7d24d895ff89fdebc8f5
SHA1d037148e50a77f0de8421e0ef81f87f9f73570da
SHA2563b50a39db6499f5cb2d3b6cec01daa5c33fcf80c0722707c6014e23ed1577280
SHA5121bc88174ee963971ca43e106828d9e74473cf1aa664f6d4fa43ec9631610ab4c1dc9a0c84f5c89dd2b627eaf64f57dee99eca84b88eb14c36bf7285cb9d7f0c4
-
Filesize
303B
MD56a0f569150af2b9f0db7444703c27a68
SHA169591c4c6e85d710d5bf89c4b6330d813bf24eb9
SHA2564dd9d1b48bef8fbd32a979c93141c60683c30da136fc0a58c69970ca78dd9878
SHA512e1c71ab22237b98603a57b3949329b242663c6d369c7ea1a2f17b05b673eb991b1890474a131fc424b921dfb26dc06acfff5df7400186d2491785c6ac420d05f
-
Filesize
305B
MD52c4ce699b73ce3278646321d836aca40
SHA172ead77fbd91cfadae8914cbb4c023a618bf0bd1
SHA256e7391b33aeb3be8afbe1b180430c606c5d3368baf7f458254cef5db9eef966e3
SHA51289ec604cd4a4ad37c5392da0bb28bd9072d731a3efdd38707eeb7b1caf7626e6917da687529bf9426d8eb89fab23175399032d545d96ab93ffd19dd54c02c075
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
304B
MD58fc460e5c1851dae2ede898b85804b31
SHA1c2887be287c1ea86cd250c38fb4e55518f764abe
SHA2567b5f9fe5a9244d0bd4888e5b70912a35d01fceed4c899585c39543682e43e1a3
SHA5127d454c1d92dd448dc9c5e00a2773bd141816aefeb0ae4ac509872db998d16889773b28753d0b02f7375631202f1d5986a18e3a67350d34741dcfc6f6c58a8775
-
Filesize
304B
MD54d1a10f22e8332513741877c47ac8970
SHA1f68ecc13b7a71e948c6d137be985138586deb726
SHA256a0dbc1b7d129cfa07a5d324fb03e41717fbdd17be3903e7e3fd7f21878dfbba4
SHA5124f1e447c41f5b694bf2bff7f21a73f2bce00dfc844d3c7722ade44249d5ac4b50cf0319630b7f3fdb890bbd76528b6d0ed6b5ad98867d09cd90dcfbfd8b96860
-
Filesize
303B
MD50a53779b07f9c9c56ef169499851915e
SHA1281bf81610dae812be159f95a0858f88f9b96637
SHA256b946117d346ecf850135aae1ac65b368f4effd806bf5180ecd3c585f1324dbd1
SHA5125a5016dcdeef68be7115eafee0a6844e3cc868fa04f353980d924fca7394962d919d8dece40b15b7ddcc867f956fc8c0e522b68688ca409f1671c39e42973dc6
-
Filesize
305B
MD5157431349a057954f4227efc1383ecad
SHA169ccc939e6b36aa1fabb96ad999540a5ab118c48
SHA2568553409a8a3813197c474a95d9ae35630e2a67f8e6f9f33b3f39ef4c78a8bfac
SHA5126405adcfa81b53980f448c489c1d13506d874d839925bffe5826479105cbf5ba194a7bdb93095585441c79c58de42f1dab1138b3d561011dc60f4b66d11e9284
-
Filesize
303B
MD56a62ed00d5950a7aa3df6d446d0beb92
SHA1608da2a7b63e92b731a7beb2d990405d7a6e9611
SHA2567aaaf31ea9c2999c775008a4b769336c91d87dc8f6dc0a1015bb45c61bc39fdb
SHA51210a77d30bd2a5a930233e79830ac6e0a695bcfacb4e33fe9a67a7dc4b4c0ffaf3ca6ce458bf2a6714b9c590997ff816f207bee87536516a2c8e711c3c161773d
-
Filesize
308B
MD55243568476eb2052b2f3b67dc9053e86
SHA1b126aa6506772f9024b76580bdf28b45e3a7f051
SHA2562d458622dc76eb87e44cc7db89309efdf50f99821145ae86864fd1b714cbaa80
SHA5123c68cef4e3daa4bca6e8b3aa5a31874be1e4dec38fe9781c6fe4890980744527d0c6818eeb519f8e6b322118e1f08302d85972fa7da4ba8be9421aabf9a77833
-
Filesize
312B
MD5c15952329e9cd008b41f979b6c76b9a2
SHA153c58cc742b5a0273df8d01ba2779a979c1ff967
SHA2565d065a88f9a1fb565c2d70e87148d469dd9dcbbefea4ccc8c181745eda748ab7
SHA5126aecdd949abcd2cb54e2fe3e1171ee47c247aa3980a0847b9934f506ef9b2d3180831adf6554c68b0621f9f9f3cd88767ef9487bc6e51cecd6a8857099a7b296
-
Filesize
304B
MD53483bf8f41c9a3b9c4acd2c9be5d8d00
SHA1fe960cf9b9744217b295ed86f66e80c58c4d6052
SHA2569b402b64c9cddf2ce4c139df23fd6354b51bb218706076d0b6ed1c128df25535
SHA5121df7f496dcd70238c3982e595964b552548a7100f3b238a65476cc57fb10e3e1d82c19ffc3f4d61ead29657623665126f3e09561bc0feb39f3aa189f603757db
-
Filesize
304B
MD5605de1f61d0446f81e63c25750e99301
SHA10eaf9121f9dc1338807a511f92ea0b30dc2982a5
SHA256049f75dee036da00f8c8366d29ee14268239df75b8be53aa104aec22b84560f0
SHA512a6a2505b8b89a895922ad6dc06d2ce620cb51cc6582c1b7e498a9f1ee1e4e47c53ebc4f92f8aa37532d558667225e30574732c9fe7187153a262c933893e4285
-
Filesize
315B
MD514b82aec966e8e370a28053db081f4e9
SHA1a0f30ebbdb4c69947d3bd41fa63ec4929dddd649
SHA256202eada95ef503b303a05caf5a666f538236c7e697f5301fd178d994fa6e24cf
SHA512ec04f1d86137dc4d75a47ba47bb2f2c912115372fa000cf986d13a04121aae9974011aa716c7da3893114e0d5d0e2fb680a6c2fd40a1f93f0e0bfd6fd625dfa7
-
Filesize
256B
MD5eea56d4853995123083a7a4c59b22fd4
SHA1defd1f6c19a85ae143e69ffb23aa2298d559c352
SHA256394ea8e958da465b5217bb6eac7cf492bcac9d61e4dac9108e841a5178ff06a4
SHA512af0e666c8defa7c2161d00829e023c9339e2fa9f8bafbd7244a40f06614a843cde882b9eba6e9741ac5d82acd4167af6a59ed03b666825b0bb7ba3eb79a8695f
-
Filesize
29KB
MD5e669e4f30fc5c4260fc6d5d4faf0d726
SHA1b98790e74082ce1e8713c11c54dc7e6843815238
SHA25627c7409ce01f5a6214ae36479ad09ad016d410fcc0227e0f32072803a3da50fe
SHA51247cd49a3966fd544d688e1b18f5c5258951bcc7e1c58a3136af2d8c6a68635549f23854b9575328d7ac67ef2b989796c3e0963f9871360031e00fbcc79d918dc
-
Filesize
288B
MD5b546bfd7dbfe80295d6f8d5850286806
SHA1cae449f03a4dd5e6cab61e518f64083618d1add7
SHA256a522063a2414725e1911fbcfb27bc2db0d89a460c653735bdaf75f08c5f79f8c
SHA5129a2b6fcd9d8d324dde270243878fc0e2103744b306ab1f986c3c66c153a60ebc68846e7e9a658c52f0a5c3423a796111bf2e737c01e75672b52535042132b92c
-
Filesize
288B
MD55976f3229a6b6dafa6aecf237dd3abe6
SHA1672e6793e36d21179223080de1b5869699bc4a06
SHA256690bd4d2debf2e9cf35ea3c61009b7dccdb829e1648769ea2d5b7efa359e39cb
SHA512bcbdb8c9d4496fe48e495d7b737217d5c4d10c65e8d98c5425298f002fc03126624ccb169f041d950d8d357284c66e6b0ac5c1af90744237254b6be58c3c0171
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2