Analysis

  • max time kernel
    119s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    02/11/2023, 00:01

General

  • Target

    NEAS.564aabe38646ed90971c0d0172a78520_JC.exe

  • Size

    74KB

  • MD5

    564aabe38646ed90971c0d0172a78520

  • SHA1

    332e15ff6e88e014f0b2e6e806377fd75c8a6b2a

  • SHA256

    cabdec9f3b8c396579571123de9ebb5e83ef0a3a228f529da951bbe849b2cf23

  • SHA512

    a8680017ec7dcab9d872f229525728860e076ea084e49446dab54b9ca5325c73f31588fcbf31e95d585c7d04f272d926112c1de177f2c5a38b6ed6c0bcf16fd5

  • SSDEEP

    1536:5lrsicagdzn8K2ariPOcjk+XQuPVN72NMSHGo9eI:5JjcF8KfCOcjk+guPVjSHr9eI

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.564aabe38646ed90971c0d0172a78520_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.564aabe38646ed90971c0d0172a78520_JC.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    PID:2028

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\macromd\Microsoft Office XP (english) key generator.exe

          Filesize

          79KB

          MD5

          de81be8d6d61ec684a0e8f30875aa51d

          SHA1

          d9715cfe32b2c7fe7d4ef6039fea7f7c053fe3d1

          SHA256

          52d53e5742bcd06a82d7e1e75f790c7b561484030377fc03412631ff6bb93e84

          SHA512

          d5f4ee9a408d57554db1727d2ef51da82c96520931dd937e2b19edb76d70f636f41d0b4a6eca75ca2ceab70d301a15cd208e95a5d038c74160390b0553862ed7

        • memory/2028-0-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/2028-34-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB