Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-11-2023 12:09

General

  • Target

    NEAS.1a0efd7abf70744797c49be39d9b25d0_JC.exe

  • Size

    7.7MB

  • MD5

    1a0efd7abf70744797c49be39d9b25d0

  • SHA1

    5aa4ccceec4c9ae81fec0842eb95b24dcf809a07

  • SHA256

    0eedade628db8f1cefb74b561fad9b9c4510a3205f0b10361fbf6090a0573b0a

  • SHA512

    c2c568cf97d8b415d4dc57790fdcd1d4e25829d80b892d2810024d72a049a8efc88d34a170cc08c3693a1175bc5c3580aab01b6510b50ca9e097657cdad12b06

  • SSDEEP

    196608:IrhJiJe52wsqjaCqUf9jlfOqnqL1QpF5ZLxpcMA:IhEe4zi9ljnnqxaz+7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.1a0efd7abf70744797c49be39d9b25d0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.1a0efd7abf70744797c49be39d9b25d0_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4756
    • C:\Users\Admin\AppData\Local\Temp\is-SC4JU.tmp\NEAS.1a0efd7abf70744797c49be39d9b25d0_JC.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-SC4JU.tmp\NEAS.1a0efd7abf70744797c49be39d9b25d0_JC.tmp" /SL5="$7011E,7869443,84992,C:\Users\Admin\AppData\Local\Temp\NEAS.1a0efd7abf70744797c49be39d9b25d0_JC.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:964
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Delete /F /TN "DL1028-3"
        3⤵
          PID:4268
        • C:\Program Files (x86)\DataLib\DataLib.exe
          "C:\Program Files (x86)\DataLib\DataLib.exe"
          3⤵
          • Executes dropped EXE
          PID:1248
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 924
            4⤵
            • Program crash
            PID:1464
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 968
            4⤵
            • Program crash
            PID:3252
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 1064
            4⤵
            • Program crash
            PID:2832
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 140
            4⤵
            • Program crash
            PID:1088
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Query
          3⤵
            PID:2536
          • C:\Program Files (x86)\DataLib\DataLib.exe
            "C:\Program Files (x86)\DataLib\DataLib.exe" 9998bdf2f7bdc51ea9987b69b4a5541d
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:4996
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 900
              4⤵
              • Program crash
              PID:4044
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 916
              4⤵
              • Program crash
              PID:4128
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 972
              4⤵
              • Program crash
              PID:1020
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 1108
              4⤵
              • Program crash
              PID:2720
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 1140
              4⤵
              • Program crash
              PID:2364
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 1200
              4⤵
              • Program crash
              PID:676
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 1244
              4⤵
              • Program crash
              PID:1364
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 1352
              4⤵
              • Program crash
              PID:4464
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 1360
              4⤵
              • Program crash
              PID:4240
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 1032
              4⤵
              • Program crash
              PID:1792
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 1220
              4⤵
              • Program crash
              PID:4952
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1248 -ip 1248
        1⤵
          PID:4244
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1248 -ip 1248
          1⤵
            PID:760
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1248 -ip 1248
            1⤵
              PID:1688
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1248 -ip 1248
              1⤵
                PID:1392
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4996 -ip 4996
                1⤵
                  PID:4848
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4996 -ip 4996
                  1⤵
                    PID:2864
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4996 -ip 4996
                    1⤵
                      PID:2688
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4996 -ip 4996
                      1⤵
                        PID:4400
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4996 -ip 4996
                        1⤵
                          PID:1820
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4996 -ip 4996
                          1⤵
                            PID:5064
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4996 -ip 4996
                            1⤵
                              PID:4940
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4996 -ip 4996
                              1⤵
                                PID:3852
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4996 -ip 4996
                                1⤵
                                  PID:3784
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4996 -ip 4996
                                  1⤵
                                    PID:2152
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4996 -ip 4996
                                    1⤵
                                      PID:3244

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Program Files (x86)\DataLib\DataLib.exe

                                      Filesize

                                      4.9MB

                                      MD5

                                      9745a65e5a31dde441dfd47ce2cb3d20

                                      SHA1

                                      00a0b3d8a92525c43d1b7fa80034e0bd2d0f40e2

                                      SHA256

                                      4cd630a4c1c682cbacbbc0e441c74ebc62168b5ef91c440dc25ed4ff09209132

                                      SHA512

                                      7a03cefa4edaaa2f205bdd528418ea03d3303998aa92ee76f0675ebbfb66b1be5680e03009fd2bd24bd9511e724196a1fc6bcaf317bcdb61dc250f7e5323676f

                                    • C:\Program Files (x86)\DataLib\DataLib.exe

                                      Filesize

                                      4.9MB

                                      MD5

                                      9745a65e5a31dde441dfd47ce2cb3d20

                                      SHA1

                                      00a0b3d8a92525c43d1b7fa80034e0bd2d0f40e2

                                      SHA256

                                      4cd630a4c1c682cbacbbc0e441c74ebc62168b5ef91c440dc25ed4ff09209132

                                      SHA512

                                      7a03cefa4edaaa2f205bdd528418ea03d3303998aa92ee76f0675ebbfb66b1be5680e03009fd2bd24bd9511e724196a1fc6bcaf317bcdb61dc250f7e5323676f

                                    • C:\Users\Admin\AppData\Local\Temp\is-LABAQ.tmp\_isetup\_iscrypt.dll

                                      Filesize

                                      2KB

                                      MD5

                                      a69559718ab506675e907fe49deb71e9

                                      SHA1

                                      bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                      SHA256

                                      2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                      SHA512

                                      e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                    • C:\Users\Admin\AppData\Local\Temp\is-SC4JU.tmp\NEAS.1a0efd7abf70744797c49be39d9b25d0_JC.tmp

                                      Filesize

                                      710KB

                                      MD5

                                      cbbf8771d950e9cdaf90c2f51fa89eae

                                      SHA1

                                      fec707cb99db603a5af0648b6694195e134b5bf2

                                      SHA256

                                      53817a61e53ecf3bd3737f1ade9015b77d274517c8b13e5c35f428a982c000ba

                                      SHA512

                                      2f8f08581c18c11a7c706402b1dc82683670176599201b79b9598c68ad19f859bad7e2c3a31769f52e08a7828b5ba5302116309f138d78b405e55967fb509cc6

                                    • C:\Users\Admin\AppData\Local\Temp\is-SC4JU.tmp\NEAS.1a0efd7abf70744797c49be39d9b25d0_JC.tmp

                                      Filesize

                                      710KB

                                      MD5

                                      cbbf8771d950e9cdaf90c2f51fa89eae

                                      SHA1

                                      fec707cb99db603a5af0648b6694195e134b5bf2

                                      SHA256

                                      53817a61e53ecf3bd3737f1ade9015b77d274517c8b13e5c35f428a982c000ba

                                      SHA512

                                      2f8f08581c18c11a7c706402b1dc82683670176599201b79b9598c68ad19f859bad7e2c3a31769f52e08a7828b5ba5302116309f138d78b405e55967fb509cc6

                                    • memory/964-7-0x0000000002250000-0x0000000002251000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/964-164-0x0000000002250000-0x0000000002251000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/964-163-0x0000000000400000-0x00000000004C2000-memory.dmp

                                      Filesize

                                      776KB

                                    • memory/964-175-0x0000000000400000-0x00000000004C2000-memory.dmp

                                      Filesize

                                      776KB

                                    • memory/1248-158-0x0000000000400000-0x0000000000CE1000-memory.dmp

                                      Filesize

                                      8.9MB

                                    • memory/1248-159-0x0000000000400000-0x0000000000CE1000-memory.dmp

                                      Filesize

                                      8.9MB

                                    • memory/1248-157-0x0000000000400000-0x0000000000CE1000-memory.dmp

                                      Filesize

                                      8.9MB

                                    • memory/1248-166-0x0000000000400000-0x0000000000CE1000-memory.dmp

                                      Filesize

                                      8.9MB

                                    • memory/1248-160-0x00000000029F0000-0x00000000029F1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1248-167-0x0000000000400000-0x0000000000CE1000-memory.dmp

                                      Filesize

                                      8.9MB

                                    • memory/4756-1-0x0000000000400000-0x000000000041C000-memory.dmp

                                      Filesize

                                      112KB

                                    • memory/4756-161-0x0000000000400000-0x000000000041C000-memory.dmp

                                      Filesize

                                      112KB

                                    • memory/4996-172-0x0000000000400000-0x0000000000CE1000-memory.dmp

                                      Filesize

                                      8.9MB

                                    • memory/4996-173-0x0000000002CE0000-0x0000000002CE1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/4996-176-0x0000000000400000-0x0000000000CE1000-memory.dmp

                                      Filesize

                                      8.9MB

                                    • memory/4996-178-0x0000000002CE0000-0x0000000002CE1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/4996-181-0x0000000000400000-0x0000000000CE1000-memory.dmp

                                      Filesize

                                      8.9MB

                                    • memory/4996-184-0x0000000000400000-0x0000000000CE1000-memory.dmp

                                      Filesize

                                      8.9MB