Analysis

  • max time kernel
    152s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/11/2023, 13:25

General

  • Target

    NEAS.3b2a06b94fb06dfa4395c6bbb63b2670_JC.exe

  • Size

    405KB

  • MD5

    3b2a06b94fb06dfa4395c6bbb63b2670

  • SHA1

    4f662521e7585665c89bdf7379352be75557dab0

  • SHA256

    3a7e7e64dfe5b7765a54ba6f827fa0134d8a8f724c850aada177f5af12f263cf

  • SHA512

    0aff521c508e1ee499d19fac24150a10780cdb69afa9d9260b5b0d13c07656d9dbd9f4e539b5fcdce0721f9320535d0f21ec6f80742929fa6b368c6e7b747f13

  • SSDEEP

    12288:UFckYBPSnrt4ru3l/EmDjND3s+lJOZcu/y:XaUi/EmDjl8+lJOZf/y

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Executes dropped EXE 18 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Modifies data under HKEY_USERS 11 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.3b2a06b94fb06dfa4395c6bbb63b2670_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.3b2a06b94fb06dfa4395c6bbb63b2670_JC.exe"
    1⤵
    • Adds policy Run key to start application
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:260
    • C:\Users\Admin\Local Settings\Application Data\sessmgr.exe
      "C:\Users\Admin\Local Settings\Application Data\sessmgr.exe" /c 65
      2⤵
      • Executes dropped EXE
      PID:4860
    • C:\Users\Admin\AppData\Roaming\Microsoft\mstinit.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\mstinit.exe /c 32
      2⤵
      • Executes dropped EXE
      PID:4404
    • C:\Users\Admin\Local Settings\Application Data\Microsoft\rsvp.exe
      "C:\Users\Admin\Local Settings\Application Data\Microsoft\rsvp.exe" /c 66
      2⤵
      • Executes dropped EXE
      PID:4176
    • C:\Users\Admin\AppData\Roaming\MICROS~1\esentutl.exe
      C:\Users\Admin\AppData\Roaming\MICROS~1\esentutl.exe /c 53
      2⤵
      • Executes dropped EXE
      PID:3316
    • C:\Users\Admin\AppData\Roaming\wininit.exe
      C:\Users\Admin\AppData\Roaming\wininit.exe /c 99
      2⤵
      • Executes dropped EXE
      PID:4856
    • C:\PROGRA~3\mstsc.exe
      C:\PROGRA~3\mstsc.exe /c 63
      2⤵
      • Executes dropped EXE
      PID:2176
    • C:\Users\Admin\Local Settings\Application Data\rsvp.exe
      "C:\Users\Admin\Local Settings\Application Data\rsvp.exe" /c 32
      2⤵
      • Executes dropped EXE
      PID:1160
    • C:\Users\Admin\AppData\Roaming\clipsrv.exe
      C:\Users\Admin\AppData\Roaming\clipsrv.exe /c 66
      2⤵
      • Executes dropped EXE
      PID:2244
    • C:\Users\Admin\Local Settings\Application Data\sessmgr.exe
      "C:\Users\Admin\Local Settings\Application Data\sessmgr.exe" /c 9
      2⤵
      • Executes dropped EXE
      PID:4444
    • C:\Users\Admin\Local Settings\Application Data\sessmgr.exe
      "C:\Users\Admin\Local Settings\Application Data\sessmgr.exe" /r
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1352
      • C:\Users\Admin\Local Settings\Application Data\sessmgr.exe
        "C:\Users\Admin\Local Settings\Application Data\sessmgr.exe" /c 40
        3⤵
        • Executes dropped EXE
        PID:1464
      • C:\Users\Admin\AppData\Roaming\Microsoft\mstinit.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\mstinit.exe /c 52
        3⤵
        • Executes dropped EXE
        PID:2316
      • C:\Users\Admin\Local Settings\Application Data\Microsoft\rsvp.exe
        "C:\Users\Admin\Local Settings\Application Data\Microsoft\rsvp.exe" /c 25
        3⤵
        • Executes dropped EXE
        PID:388
      • C:\Users\Admin\AppData\Roaming\MICROS~1\esentutl.exe
        C:\Users\Admin\AppData\Roaming\MICROS~1\esentutl.exe /c 96
        3⤵
        • Executes dropped EXE
        PID:2660
      • C:\Users\Admin\AppData\Roaming\wininit.exe
        C:\Users\Admin\AppData\Roaming\wininit.exe /c 37
        3⤵
        • Executes dropped EXE
        PID:216
      • C:\PROGRA~3\mstsc.exe
        C:\PROGRA~3\mstsc.exe /c 48
        3⤵
        • Executes dropped EXE
        PID:3008
      • C:\Users\Admin\Local Settings\Application Data\rsvp.exe
        "C:\Users\Admin\Local Settings\Application Data\rsvp.exe" /c 54
        3⤵
        • Executes dropped EXE
        PID:1944
      • C:\Users\Admin\AppData\Roaming\clipsrv.exe
        C:\Users\Admin\AppData\Roaming\clipsrv.exe /c 19
        3⤵
        • Executes dropped EXE
        PID:4504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\mstsc.exe

    Filesize

    405KB

    MD5

    419279b6617d23ea1e98937d834f7618

    SHA1

    c85c9470d88a80e80b95d5e4e44b17e2aa32fee8

    SHA256

    74dd0fb50005d5fd451189c3fc3297e6d9f9341888ad2a061f95f563cfc8ae73

    SHA512

    8950d727d3cae75256043d449563606b39ee40f2e747ffd741284c9777889de4c72e296be75bb56fa44407f87578c0e54ac4a111422bf933868efb5093be24ff

  • C:\ProgramData\mstsc.exe

    Filesize

    405KB

    MD5

    419279b6617d23ea1e98937d834f7618

    SHA1

    c85c9470d88a80e80b95d5e4e44b17e2aa32fee8

    SHA256

    74dd0fb50005d5fd451189c3fc3297e6d9f9341888ad2a061f95f563cfc8ae73

    SHA512

    8950d727d3cae75256043d449563606b39ee40f2e747ffd741284c9777889de4c72e296be75bb56fa44407f87578c0e54ac4a111422bf933868efb5093be24ff

  • C:\ProgramData\mstsc.exe

    Filesize

    405KB

    MD5

    419279b6617d23ea1e98937d834f7618

    SHA1

    c85c9470d88a80e80b95d5e4e44b17e2aa32fee8

    SHA256

    74dd0fb50005d5fd451189c3fc3297e6d9f9341888ad2a061f95f563cfc8ae73

    SHA512

    8950d727d3cae75256043d449563606b39ee40f2e747ffd741284c9777889de4c72e296be75bb56fa44407f87578c0e54ac4a111422bf933868efb5093be24ff

  • C:\Users\Admin\AppData\Local\Microsoft\rsvp.exe

    Filesize

    405KB

    MD5

    3b2a06b94fb06dfa4395c6bbb63b2670

    SHA1

    4f662521e7585665c89bdf7379352be75557dab0

    SHA256

    3a7e7e64dfe5b7765a54ba6f827fa0134d8a8f724c850aada177f5af12f263cf

    SHA512

    0aff521c508e1ee499d19fac24150a10780cdb69afa9d9260b5b0d13c07656d9dbd9f4e539b5fcdce0721f9320535d0f21ec6f80742929fa6b368c6e7b747f13

  • C:\Users\Admin\AppData\Local\Microsoft\rsvp.exe

    Filesize

    405KB

    MD5

    3b2a06b94fb06dfa4395c6bbb63b2670

    SHA1

    4f662521e7585665c89bdf7379352be75557dab0

    SHA256

    3a7e7e64dfe5b7765a54ba6f827fa0134d8a8f724c850aada177f5af12f263cf

    SHA512

    0aff521c508e1ee499d19fac24150a10780cdb69afa9d9260b5b0d13c07656d9dbd9f4e539b5fcdce0721f9320535d0f21ec6f80742929fa6b368c6e7b747f13

  • C:\Users\Admin\AppData\Local\RCXC023.tmp

    Filesize

    405KB

    MD5

    eba35ebb8b5e7fac394c3d6f15f1aff8

    SHA1

    20b31f83735ae9df132b31eef5b8b0d3f0edacb5

    SHA256

    4b30ad3852a17470469a9a843e8d2a9d059eaf6aba4369332a47f4c82c379bc6

    SHA512

    5388839bbbca2fb2f7fb8e4be1fac39876edf02d93279d1d29caa36a84bb564901f4fa2e56c3efc303f3080b4486d765f9dc440f1a66d26720744fff9e17ad47

  • C:\Users\Admin\AppData\Local\Temp\Twain002.Mtx

    Filesize

    10B

    MD5

    67e5d436528fdeb852e3d055ec178120

    SHA1

    84e20964d2aeaaee90444aa9dc902ae6c6b80f1e

    SHA256

    b1913666ded3e36be560e614e4e99aa6db85b439ec365cdbcfbfd58fc8ed3a46

    SHA512

    2fa35acb2708651e3c9c9526cce75a2a181dd228706c508a571adb6cdc83d8d9170b1023564b0dff12f3e0a66313b8752fd0afb7cae4b5eab9b803c3c2320c7e

  • C:\Users\Admin\AppData\Local\rsvp.exe

    Filesize

    405KB

    MD5

    3b2a06b94fb06dfa4395c6bbb63b2670

    SHA1

    4f662521e7585665c89bdf7379352be75557dab0

    SHA256

    3a7e7e64dfe5b7765a54ba6f827fa0134d8a8f724c850aada177f5af12f263cf

    SHA512

    0aff521c508e1ee499d19fac24150a10780cdb69afa9d9260b5b0d13c07656d9dbd9f4e539b5fcdce0721f9320535d0f21ec6f80742929fa6b368c6e7b747f13

  • C:\Users\Admin\AppData\Local\rsvp.exe

    Filesize

    405KB

    MD5

    3b2a06b94fb06dfa4395c6bbb63b2670

    SHA1

    4f662521e7585665c89bdf7379352be75557dab0

    SHA256

    3a7e7e64dfe5b7765a54ba6f827fa0134d8a8f724c850aada177f5af12f263cf

    SHA512

    0aff521c508e1ee499d19fac24150a10780cdb69afa9d9260b5b0d13c07656d9dbd9f4e539b5fcdce0721f9320535d0f21ec6f80742929fa6b368c6e7b747f13

  • C:\Users\Admin\AppData\Local\sessmgr.exe

    Filesize

    405KB

    MD5

    3b2a06b94fb06dfa4395c6bbb63b2670

    SHA1

    4f662521e7585665c89bdf7379352be75557dab0

    SHA256

    3a7e7e64dfe5b7765a54ba6f827fa0134d8a8f724c850aada177f5af12f263cf

    SHA512

    0aff521c508e1ee499d19fac24150a10780cdb69afa9d9260b5b0d13c07656d9dbd9f4e539b5fcdce0721f9320535d0f21ec6f80742929fa6b368c6e7b747f13

  • C:\Users\Admin\AppData\Local\sessmgr.exe

    Filesize

    405KB

    MD5

    3b2a06b94fb06dfa4395c6bbb63b2670

    SHA1

    4f662521e7585665c89bdf7379352be75557dab0

    SHA256

    3a7e7e64dfe5b7765a54ba6f827fa0134d8a8f724c850aada177f5af12f263cf

    SHA512

    0aff521c508e1ee499d19fac24150a10780cdb69afa9d9260b5b0d13c07656d9dbd9f4e539b5fcdce0721f9320535d0f21ec6f80742929fa6b368c6e7b747f13

  • C:\Users\Admin\AppData\Local\sessmgr.exe

    Filesize

    405KB

    MD5

    3b2a06b94fb06dfa4395c6bbb63b2670

    SHA1

    4f662521e7585665c89bdf7379352be75557dab0

    SHA256

    3a7e7e64dfe5b7765a54ba6f827fa0134d8a8f724c850aada177f5af12f263cf

    SHA512

    0aff521c508e1ee499d19fac24150a10780cdb69afa9d9260b5b0d13c07656d9dbd9f4e539b5fcdce0721f9320535d0f21ec6f80742929fa6b368c6e7b747f13

  • C:\Users\Admin\AppData\Local\sessmgr.exe

    Filesize

    405KB

    MD5

    3b2a06b94fb06dfa4395c6bbb63b2670

    SHA1

    4f662521e7585665c89bdf7379352be75557dab0

    SHA256

    3a7e7e64dfe5b7765a54ba6f827fa0134d8a8f724c850aada177f5af12f263cf

    SHA512

    0aff521c508e1ee499d19fac24150a10780cdb69afa9d9260b5b0d13c07656d9dbd9f4e539b5fcdce0721f9320535d0f21ec6f80742929fa6b368c6e7b747f13

  • C:\Users\Admin\AppData\Roaming\MICROS~1\esentutl.exe

    Filesize

    405KB

    MD5

    3b2a06b94fb06dfa4395c6bbb63b2670

    SHA1

    4f662521e7585665c89bdf7379352be75557dab0

    SHA256

    3a7e7e64dfe5b7765a54ba6f827fa0134d8a8f724c850aada177f5af12f263cf

    SHA512

    0aff521c508e1ee499d19fac24150a10780cdb69afa9d9260b5b0d13c07656d9dbd9f4e539b5fcdce0721f9320535d0f21ec6f80742929fa6b368c6e7b747f13

  • C:\Users\Admin\AppData\Roaming\Microsoft\esentutl.exe

    Filesize

    405KB

    MD5

    3b2a06b94fb06dfa4395c6bbb63b2670

    SHA1

    4f662521e7585665c89bdf7379352be75557dab0

    SHA256

    3a7e7e64dfe5b7765a54ba6f827fa0134d8a8f724c850aada177f5af12f263cf

    SHA512

    0aff521c508e1ee499d19fac24150a10780cdb69afa9d9260b5b0d13c07656d9dbd9f4e539b5fcdce0721f9320535d0f21ec6f80742929fa6b368c6e7b747f13

  • C:\Users\Admin\AppData\Roaming\Microsoft\esentutl.exe

    Filesize

    405KB

    MD5

    3b2a06b94fb06dfa4395c6bbb63b2670

    SHA1

    4f662521e7585665c89bdf7379352be75557dab0

    SHA256

    3a7e7e64dfe5b7765a54ba6f827fa0134d8a8f724c850aada177f5af12f263cf

    SHA512

    0aff521c508e1ee499d19fac24150a10780cdb69afa9d9260b5b0d13c07656d9dbd9f4e539b5fcdce0721f9320535d0f21ec6f80742929fa6b368c6e7b747f13

  • C:\Users\Admin\AppData\Roaming\Microsoft\mstinit.exe

    Filesize

    405KB

    MD5

    3b2a06b94fb06dfa4395c6bbb63b2670

    SHA1

    4f662521e7585665c89bdf7379352be75557dab0

    SHA256

    3a7e7e64dfe5b7765a54ba6f827fa0134d8a8f724c850aada177f5af12f263cf

    SHA512

    0aff521c508e1ee499d19fac24150a10780cdb69afa9d9260b5b0d13c07656d9dbd9f4e539b5fcdce0721f9320535d0f21ec6f80742929fa6b368c6e7b747f13

  • C:\Users\Admin\AppData\Roaming\Microsoft\mstinit.exe

    Filesize

    405KB

    MD5

    3b2a06b94fb06dfa4395c6bbb63b2670

    SHA1

    4f662521e7585665c89bdf7379352be75557dab0

    SHA256

    3a7e7e64dfe5b7765a54ba6f827fa0134d8a8f724c850aada177f5af12f263cf

    SHA512

    0aff521c508e1ee499d19fac24150a10780cdb69afa9d9260b5b0d13c07656d9dbd9f4e539b5fcdce0721f9320535d0f21ec6f80742929fa6b368c6e7b747f13

  • C:\Users\Admin\AppData\Roaming\Microsoft\mstinit.exe

    Filesize

    405KB

    MD5

    3b2a06b94fb06dfa4395c6bbb63b2670

    SHA1

    4f662521e7585665c89bdf7379352be75557dab0

    SHA256

    3a7e7e64dfe5b7765a54ba6f827fa0134d8a8f724c850aada177f5af12f263cf

    SHA512

    0aff521c508e1ee499d19fac24150a10780cdb69afa9d9260b5b0d13c07656d9dbd9f4e539b5fcdce0721f9320535d0f21ec6f80742929fa6b368c6e7b747f13

  • C:\Users\Admin\AppData\Roaming\clipsrv.exe

    Filesize

    405KB

    MD5

    3b2a06b94fb06dfa4395c6bbb63b2670

    SHA1

    4f662521e7585665c89bdf7379352be75557dab0

    SHA256

    3a7e7e64dfe5b7765a54ba6f827fa0134d8a8f724c850aada177f5af12f263cf

    SHA512

    0aff521c508e1ee499d19fac24150a10780cdb69afa9d9260b5b0d13c07656d9dbd9f4e539b5fcdce0721f9320535d0f21ec6f80742929fa6b368c6e7b747f13

  • C:\Users\Admin\AppData\Roaming\clipsrv.exe

    Filesize

    405KB

    MD5

    3b2a06b94fb06dfa4395c6bbb63b2670

    SHA1

    4f662521e7585665c89bdf7379352be75557dab0

    SHA256

    3a7e7e64dfe5b7765a54ba6f827fa0134d8a8f724c850aada177f5af12f263cf

    SHA512

    0aff521c508e1ee499d19fac24150a10780cdb69afa9d9260b5b0d13c07656d9dbd9f4e539b5fcdce0721f9320535d0f21ec6f80742929fa6b368c6e7b747f13

  • C:\Users\Admin\AppData\Roaming\clipsrv.exe

    Filesize

    405KB

    MD5

    3b2a06b94fb06dfa4395c6bbb63b2670

    SHA1

    4f662521e7585665c89bdf7379352be75557dab0

    SHA256

    3a7e7e64dfe5b7765a54ba6f827fa0134d8a8f724c850aada177f5af12f263cf

    SHA512

    0aff521c508e1ee499d19fac24150a10780cdb69afa9d9260b5b0d13c07656d9dbd9f4e539b5fcdce0721f9320535d0f21ec6f80742929fa6b368c6e7b747f13

  • C:\Users\Admin\AppData\Roaming\wininit.exe

    Filesize

    405KB

    MD5

    3b2a06b94fb06dfa4395c6bbb63b2670

    SHA1

    4f662521e7585665c89bdf7379352be75557dab0

    SHA256

    3a7e7e64dfe5b7765a54ba6f827fa0134d8a8f724c850aada177f5af12f263cf

    SHA512

    0aff521c508e1ee499d19fac24150a10780cdb69afa9d9260b5b0d13c07656d9dbd9f4e539b5fcdce0721f9320535d0f21ec6f80742929fa6b368c6e7b747f13

  • C:\Users\Admin\AppData\Roaming\wininit.exe

    Filesize

    405KB

    MD5

    3b2a06b94fb06dfa4395c6bbb63b2670

    SHA1

    4f662521e7585665c89bdf7379352be75557dab0

    SHA256

    3a7e7e64dfe5b7765a54ba6f827fa0134d8a8f724c850aada177f5af12f263cf

    SHA512

    0aff521c508e1ee499d19fac24150a10780cdb69afa9d9260b5b0d13c07656d9dbd9f4e539b5fcdce0721f9320535d0f21ec6f80742929fa6b368c6e7b747f13

  • C:\Users\Admin\AppData\Roaming\wininit.exe

    Filesize

    405KB

    MD5

    3b2a06b94fb06dfa4395c6bbb63b2670

    SHA1

    4f662521e7585665c89bdf7379352be75557dab0

    SHA256

    3a7e7e64dfe5b7765a54ba6f827fa0134d8a8f724c850aada177f5af12f263cf

    SHA512

    0aff521c508e1ee499d19fac24150a10780cdb69afa9d9260b5b0d13c07656d9dbd9f4e539b5fcdce0721f9320535d0f21ec6f80742929fa6b368c6e7b747f13

  • C:\Users\Admin\Local Settings\Application Data\Microsoft\rsvp.exe

    Filesize

    405KB

    MD5

    3b2a06b94fb06dfa4395c6bbb63b2670

    SHA1

    4f662521e7585665c89bdf7379352be75557dab0

    SHA256

    3a7e7e64dfe5b7765a54ba6f827fa0134d8a8f724c850aada177f5af12f263cf

    SHA512

    0aff521c508e1ee499d19fac24150a10780cdb69afa9d9260b5b0d13c07656d9dbd9f4e539b5fcdce0721f9320535d0f21ec6f80742929fa6b368c6e7b747f13

  • C:\Users\Admin\Local Settings\Application Data\rsvp.exe

    Filesize

    405KB

    MD5

    3b2a06b94fb06dfa4395c6bbb63b2670

    SHA1

    4f662521e7585665c89bdf7379352be75557dab0

    SHA256

    3a7e7e64dfe5b7765a54ba6f827fa0134d8a8f724c850aada177f5af12f263cf

    SHA512

    0aff521c508e1ee499d19fac24150a10780cdb69afa9d9260b5b0d13c07656d9dbd9f4e539b5fcdce0721f9320535d0f21ec6f80742929fa6b368c6e7b747f13

  • C:\Users\Admin\Local Settings\Application Data\sessmgr.exe

    Filesize

    405KB

    MD5

    3b2a06b94fb06dfa4395c6bbb63b2670

    SHA1

    4f662521e7585665c89bdf7379352be75557dab0

    SHA256

    3a7e7e64dfe5b7765a54ba6f827fa0134d8a8f724c850aada177f5af12f263cf

    SHA512

    0aff521c508e1ee499d19fac24150a10780cdb69afa9d9260b5b0d13c07656d9dbd9f4e539b5fcdce0721f9320535d0f21ec6f80742929fa6b368c6e7b747f13