Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 11:40
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.13d69b164669fead9d0a065ad74c0670_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.13d69b164669fead9d0a065ad74c0670_JC.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.13d69b164669fead9d0a065ad74c0670_JC.exe
-
Size
1.1MB
-
MD5
13d69b164669fead9d0a065ad74c0670
-
SHA1
3776a0c1d40e8b9ee1e38dda4916b5a2f72e2b72
-
SHA256
ecaa20a3da295e99c840f6c7f46080c0f6c5567b1fa0d966caecce9197602737
-
SHA512
3be64789d8843d1be37c52d2190fa8af69df2ba31eec7439fc20c2ecd3b44c667d5fa3aae83002b07f7856b7d5fcc1d8d32062a336de0afb0f2bd7ddd0164745
-
SSDEEP
24576:c96IumzrmHHI7tEctS7RQLkHaoZta/ZS/Ix77Lv+f6T8Qns7:cYIReoSsMRf6ozgoIxbq7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4708 NEAS.13d69b164669fead9d0a065ad74c0670_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 4708 NEAS.13d69b164669fead9d0a065ad74c0670_JC.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 13 IoCs
pid pid_target Process procid_target 5096 3192 WerFault.exe 84 4480 4708 WerFault.exe 92 4528 4708 WerFault.exe 92 4784 4708 WerFault.exe 92 432 4708 WerFault.exe 92 3980 4708 WerFault.exe 92 4356 4708 WerFault.exe 92 2920 4708 WerFault.exe 92 408 4708 WerFault.exe 92 1740 4708 WerFault.exe 92 3224 4708 WerFault.exe 92 4172 4708 WerFault.exe 92 4996 4708 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4708 NEAS.13d69b164669fead9d0a065ad74c0670_JC.exe 4708 NEAS.13d69b164669fead9d0a065ad74c0670_JC.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3192 NEAS.13d69b164669fead9d0a065ad74c0670_JC.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4708 NEAS.13d69b164669fead9d0a065ad74c0670_JC.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3192 wrote to memory of 4708 3192 NEAS.13d69b164669fead9d0a065ad74c0670_JC.exe 92 PID 3192 wrote to memory of 4708 3192 NEAS.13d69b164669fead9d0a065ad74c0670_JC.exe 92 PID 3192 wrote to memory of 4708 3192 NEAS.13d69b164669fead9d0a065ad74c0670_JC.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.13d69b164669fead9d0a065ad74c0670_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.13d69b164669fead9d0a065ad74c0670_JC.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 3442⤵
- Program crash
PID:5096
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.13d69b164669fead9d0a065ad74c0670_JC.exeC:\Users\Admin\AppData\Local\Temp\NEAS.13d69b164669fead9d0a065ad74c0670_JC.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:4708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 3443⤵
- Program crash
PID:4480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 6363⤵
- Program crash
PID:4528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 6523⤵
- Program crash
PID:4784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 6523⤵
- Program crash
PID:432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 7203⤵
- Program crash
PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 9043⤵
- Program crash
PID:4356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 14163⤵
- Program crash
PID:2920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 14643⤵
- Program crash
PID:408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 14283⤵
- Program crash
PID:1740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 17203⤵
- Program crash
PID:3224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 17083⤵
- Program crash
PID:4172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 16483⤵
- Program crash
PID:4996
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3192 -ip 31921⤵PID:852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4708 -ip 47081⤵PID:1700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4708 -ip 47081⤵PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4708 -ip 47081⤵PID:1164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4708 -ip 47081⤵PID:1944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4708 -ip 47081⤵PID:3888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4708 -ip 47081⤵PID:4152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4708 -ip 47081⤵PID:1160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4708 -ip 47081⤵PID:4976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4708 -ip 47081⤵PID:4432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4708 -ip 47081⤵PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4708 -ip 47081⤵PID:3988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4708 -ip 47081⤵PID:868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5847373d4769898f36477c3ae7d900b3c
SHA106a60a9e7bc8317544deb53dd66e5b1404a4cf91
SHA256871b6cde2db92ea318c03334b7fc352611d8dec6ddbe92c4d7b7bd6982dc73af
SHA512e1668ba3776a5c25d4f679c9ba2096f83e9f08e2c86660e343e2bad0d02e2f0e1567e90265240752327d866b36f9068636810daaade3813c070c2cdd021252ae