Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-11-2023 01:48

General

  • Target

    NEAS.c8aca3271c791762c193096937c7f3c0_JC.exe

  • Size

    60KB

  • MD5

    c8aca3271c791762c193096937c7f3c0

  • SHA1

    67586b914db27e608324d56363b594a95bbd6380

  • SHA256

    1cd34677ab9add040fcfd917d98319ee4011c2a06ba2c01e0572bb49977bc71f

  • SHA512

    b2349f0f11a168e75985cc706c3ce375664bfd8740f09d869260620464de33b5ba0acadf99ee72fe25ca8f0f8aeac383001bc890e9721847ad5ec6684ab4cb41

  • SSDEEP

    384:vbLwOs8AHsc4sMfwhKQLrod4/CFsrdHWMZ:vvw9816vhKQLrod4/wQpWMZ

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 18 IoCs
  • Executes dropped EXE 9 IoCs
  • Drops file in Windows directory 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.c8aca3271c791762c193096937c7f3c0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.c8aca3271c791762c193096937c7f3c0_JC.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Windows\{51614D1E-4BC2-447f-ABBF-FAD32A6C5F0A}.exe
      C:\Windows\{51614D1E-4BC2-447f-ABBF-FAD32A6C5F0A}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4596
      • C:\Windows\{7C42C3EF-1ACC-410c-81E2-9AF6BABA727B}.exe
        C:\Windows\{7C42C3EF-1ACC-410c-81E2-9AF6BABA727B}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:772
        • C:\Windows\{AE532BF6-D764-49a2-90BD-43935251C275}.exe
          C:\Windows\{AE532BF6-D764-49a2-90BD-43935251C275}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:820
          • C:\Windows\{B9886BD6-172F-43fb-8984-B752D1F846C7}.exe
            C:\Windows\{B9886BD6-172F-43fb-8984-B752D1F846C7}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3208
            • C:\Windows\{25D67E19-82FC-48cf-BC62-9B80D6FCEE4E}.exe
              C:\Windows\{25D67E19-82FC-48cf-BC62-9B80D6FCEE4E}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3196
              • C:\Windows\{F235CC9C-6755-4ad9-ACFF-66A0770E41A4}.exe
                C:\Windows\{F235CC9C-6755-4ad9-ACFF-66A0770E41A4}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3496
                • C:\Windows\{3F6F57C0-EDF4-4259-A70C-56B99615CC53}.exe
                  C:\Windows\{3F6F57C0-EDF4-4259-A70C-56B99615CC53}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4732
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{3F6F5~1.EXE > nul
                    9⤵
                      PID:2552
                    • C:\Windows\{CF5352BF-6290-4c4c-8538-3DF9D1A28B5A}.exe
                      C:\Windows\{CF5352BF-6290-4c4c-8538-3DF9D1A28B5A}.exe
                      9⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:4272
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{CF535~1.EXE > nul
                        10⤵
                          PID:2680
                        • C:\Windows\{95F2DD29-595F-440d-A162-15B293844729}.exe
                          C:\Windows\{95F2DD29-595F-440d-A162-15B293844729}.exe
                          10⤵
                          • Executes dropped EXE
                          PID:3452
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{F235C~1.EXE > nul
                      8⤵
                        PID:2248
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{25D67~1.EXE > nul
                      7⤵
                        PID:2572
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{B9886~1.EXE > nul
                      6⤵
                        PID:4140
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{AE532~1.EXE > nul
                      5⤵
                        PID:3024
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{7C42C~1.EXE > nul
                      4⤵
                        PID:4516
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{51614~1.EXE > nul
                      3⤵
                        PID:640
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\NEASC8~1.EXE > nul
                      2⤵
                        PID:228

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Windows\{25D67E19-82FC-48cf-BC62-9B80D6FCEE4E}.exe

                      Filesize

                      60KB

                      MD5

                      63fc8aa95b3f7272cf97a971f206952a

                      SHA1

                      4dd0472b53686e708baf8b42d2a959a1d424d2c6

                      SHA256

                      9080b120583c8b95cc3950c399292b67bfcd71f9649e9ca0bbaf2208bc0a1f5f

                      SHA512

                      c53f50ac5053cfa5b1a0685ac47329fa095168d2cc2a3d786e31a657bcdd75d65f0b82d2dd2a4fe702df6f694826e3410ddbc8e00444589ad23afb7d73e36861

                    • C:\Windows\{25D67E19-82FC-48cf-BC62-9B80D6FCEE4E}.exe

                      Filesize

                      60KB

                      MD5

                      63fc8aa95b3f7272cf97a971f206952a

                      SHA1

                      4dd0472b53686e708baf8b42d2a959a1d424d2c6

                      SHA256

                      9080b120583c8b95cc3950c399292b67bfcd71f9649e9ca0bbaf2208bc0a1f5f

                      SHA512

                      c53f50ac5053cfa5b1a0685ac47329fa095168d2cc2a3d786e31a657bcdd75d65f0b82d2dd2a4fe702df6f694826e3410ddbc8e00444589ad23afb7d73e36861

                    • C:\Windows\{3F6F57C0-EDF4-4259-A70C-56B99615CC53}.exe

                      Filesize

                      60KB

                      MD5

                      4e0c2d0240b3ad13087016c70d08e2bb

                      SHA1

                      2b1378d88c3e8ba88ababaf396141be67bee05a5

                      SHA256

                      c52dff464021bf9108fe996cc127abf8388e20d856095a9fef6f04a51707fcae

                      SHA512

                      a54a06ef05f59c4c34f90ebe999e69e5d51268686bbd69a43f286d0be1bc1ccf247edaca8828666db5b3435a1cf3b03fff3ea488ae27f52d02768a4f558bc6d4

                    • C:\Windows\{3F6F57C0-EDF4-4259-A70C-56B99615CC53}.exe

                      Filesize

                      60KB

                      MD5

                      4e0c2d0240b3ad13087016c70d08e2bb

                      SHA1

                      2b1378d88c3e8ba88ababaf396141be67bee05a5

                      SHA256

                      c52dff464021bf9108fe996cc127abf8388e20d856095a9fef6f04a51707fcae

                      SHA512

                      a54a06ef05f59c4c34f90ebe999e69e5d51268686bbd69a43f286d0be1bc1ccf247edaca8828666db5b3435a1cf3b03fff3ea488ae27f52d02768a4f558bc6d4

                    • C:\Windows\{51614D1E-4BC2-447f-ABBF-FAD32A6C5F0A}.exe

                      Filesize

                      60KB

                      MD5

                      fe1dd3ff7af14ffbde164691a9c1afba

                      SHA1

                      c036a2b4f963885f4a436ff537cecc12bc294409

                      SHA256

                      795e0f3cb8c8412e10ee9e271a87da8b8add2f8692a7b110e2a4badac192c766

                      SHA512

                      063edd77036cfd0a7cafb17d51f4a60dd73c6c6cf7f4ca0fd56bc27560f5317e3a1bf0ef9bfe633626b565f80dffd202987edfee37b0ae00ea14feb4d41ce9e5

                    • C:\Windows\{51614D1E-4BC2-447f-ABBF-FAD32A6C5F0A}.exe

                      Filesize

                      60KB

                      MD5

                      fe1dd3ff7af14ffbde164691a9c1afba

                      SHA1

                      c036a2b4f963885f4a436ff537cecc12bc294409

                      SHA256

                      795e0f3cb8c8412e10ee9e271a87da8b8add2f8692a7b110e2a4badac192c766

                      SHA512

                      063edd77036cfd0a7cafb17d51f4a60dd73c6c6cf7f4ca0fd56bc27560f5317e3a1bf0ef9bfe633626b565f80dffd202987edfee37b0ae00ea14feb4d41ce9e5

                    • C:\Windows\{7C42C3EF-1ACC-410c-81E2-9AF6BABA727B}.exe

                      Filesize

                      60KB

                      MD5

                      4d30c6f71313f06f9516e42044700de0

                      SHA1

                      936288da2fd8c30113c2967350abfb9cb775e4e7

                      SHA256

                      9731a03a4564fa77219f49075b937fbe239eb64871aef89e08d0c62e130bab3c

                      SHA512

                      9ac0d96b715e8df8035baac5bda9773c70bd09d99ee95f7115ddae582d3d9f14870fd8ece7c54b5bc578b9b96e17538227b744d68652e31a20932ef27f8313a5

                    • C:\Windows\{7C42C3EF-1ACC-410c-81E2-9AF6BABA727B}.exe

                      Filesize

                      60KB

                      MD5

                      4d30c6f71313f06f9516e42044700de0

                      SHA1

                      936288da2fd8c30113c2967350abfb9cb775e4e7

                      SHA256

                      9731a03a4564fa77219f49075b937fbe239eb64871aef89e08d0c62e130bab3c

                      SHA512

                      9ac0d96b715e8df8035baac5bda9773c70bd09d99ee95f7115ddae582d3d9f14870fd8ece7c54b5bc578b9b96e17538227b744d68652e31a20932ef27f8313a5

                    • C:\Windows\{95F2DD29-595F-440d-A162-15B293844729}.exe

                      Filesize

                      60KB

                      MD5

                      ed2bbbf3c9974bfec9a96c715d1d7d74

                      SHA1

                      5d74330beee8e61a8085166176270f61b713e5e7

                      SHA256

                      7c5584556ec7b6537ba4db4056cbd1d6786852b35b3b1be6e9026a7cb16ea602

                      SHA512

                      a655d9987486318d65287e2428678d51c6e11c470b314289c3d00c274986caf82601bba45346cdd4b3311ef324065a2f8ccfac46362498b73135bd05300aac43

                    • C:\Windows\{95F2DD29-595F-440d-A162-15B293844729}.exe

                      Filesize

                      60KB

                      MD5

                      ed2bbbf3c9974bfec9a96c715d1d7d74

                      SHA1

                      5d74330beee8e61a8085166176270f61b713e5e7

                      SHA256

                      7c5584556ec7b6537ba4db4056cbd1d6786852b35b3b1be6e9026a7cb16ea602

                      SHA512

                      a655d9987486318d65287e2428678d51c6e11c470b314289c3d00c274986caf82601bba45346cdd4b3311ef324065a2f8ccfac46362498b73135bd05300aac43

                    • C:\Windows\{AE532BF6-D764-49a2-90BD-43935251C275}.exe

                      Filesize

                      60KB

                      MD5

                      5feaed5adaabffd965ee850e10ac0026

                      SHA1

                      fe83b1747a2647b333b7c8f019bc67eeb94b0673

                      SHA256

                      7c1b392c734b1132c0b2b27afd333e5725eee97ec3fdb2ea68f82becee0d1c94

                      SHA512

                      4641648b0195a83fc81d5fc06ef6a8d56b178a14eb41c4421e9f1e8026f5038a4258bea1140d00b1282c374f3f562f11080e8e8cd0906ff1e547ddd0fd9c7a09

                    • C:\Windows\{AE532BF6-D764-49a2-90BD-43935251C275}.exe

                      Filesize

                      60KB

                      MD5

                      5feaed5adaabffd965ee850e10ac0026

                      SHA1

                      fe83b1747a2647b333b7c8f019bc67eeb94b0673

                      SHA256

                      7c1b392c734b1132c0b2b27afd333e5725eee97ec3fdb2ea68f82becee0d1c94

                      SHA512

                      4641648b0195a83fc81d5fc06ef6a8d56b178a14eb41c4421e9f1e8026f5038a4258bea1140d00b1282c374f3f562f11080e8e8cd0906ff1e547ddd0fd9c7a09

                    • C:\Windows\{AE532BF6-D764-49a2-90BD-43935251C275}.exe

                      Filesize

                      60KB

                      MD5

                      5feaed5adaabffd965ee850e10ac0026

                      SHA1

                      fe83b1747a2647b333b7c8f019bc67eeb94b0673

                      SHA256

                      7c1b392c734b1132c0b2b27afd333e5725eee97ec3fdb2ea68f82becee0d1c94

                      SHA512

                      4641648b0195a83fc81d5fc06ef6a8d56b178a14eb41c4421e9f1e8026f5038a4258bea1140d00b1282c374f3f562f11080e8e8cd0906ff1e547ddd0fd9c7a09

                    • C:\Windows\{B9886BD6-172F-43fb-8984-B752D1F846C7}.exe

                      Filesize

                      60KB

                      MD5

                      8907562dd5a6550d1876b5a6dd54d8f3

                      SHA1

                      ba9644198fc828717e056a9babae3d64a5529dca

                      SHA256

                      c89be81d995122e8bef0ac8fceb550ae64575365a9c03c94c1e7555aaee3a642

                      SHA512

                      7679fb5caca17405cf2f4ab91a565b879577c07db53925d6cd4ac66844599af50ae89400e5d617d4727e164320bb562d266e90de3da81e9beafb2f4ab185e486

                    • C:\Windows\{B9886BD6-172F-43fb-8984-B752D1F846C7}.exe

                      Filesize

                      60KB

                      MD5

                      8907562dd5a6550d1876b5a6dd54d8f3

                      SHA1

                      ba9644198fc828717e056a9babae3d64a5529dca

                      SHA256

                      c89be81d995122e8bef0ac8fceb550ae64575365a9c03c94c1e7555aaee3a642

                      SHA512

                      7679fb5caca17405cf2f4ab91a565b879577c07db53925d6cd4ac66844599af50ae89400e5d617d4727e164320bb562d266e90de3da81e9beafb2f4ab185e486

                    • C:\Windows\{CF5352BF-6290-4c4c-8538-3DF9D1A28B5A}.exe

                      Filesize

                      60KB

                      MD5

                      07ba0ad8d40cda8b5ac44d980c720bc0

                      SHA1

                      63941e9ebc1384456a6828939090292593c4ba9d

                      SHA256

                      043a53bec1b3ed92ff7798df18c4df85c2289d2ca9c3c03f9c24fa468c38dfb4

                      SHA512

                      ad5b19d97c95d4ba3942d8cc437b1153ca58767354713659e3f2e498ca0d957378e74a4dbd32946650a58867d66be8d65a9b2b3353a3bc7f884b4c8f38fe3709

                    • C:\Windows\{CF5352BF-6290-4c4c-8538-3DF9D1A28B5A}.exe

                      Filesize

                      60KB

                      MD5

                      07ba0ad8d40cda8b5ac44d980c720bc0

                      SHA1

                      63941e9ebc1384456a6828939090292593c4ba9d

                      SHA256

                      043a53bec1b3ed92ff7798df18c4df85c2289d2ca9c3c03f9c24fa468c38dfb4

                      SHA512

                      ad5b19d97c95d4ba3942d8cc437b1153ca58767354713659e3f2e498ca0d957378e74a4dbd32946650a58867d66be8d65a9b2b3353a3bc7f884b4c8f38fe3709

                    • C:\Windows\{F235CC9C-6755-4ad9-ACFF-66A0770E41A4}.exe

                      Filesize

                      60KB

                      MD5

                      748ce49c2c38e4cee14a5d8ad958368a

                      SHA1

                      aabf11b77465d710cde300d46dbb4808ffa73a76

                      SHA256

                      bda8e6dedde37135fe6c1063fb57272c267651f34012f083edfaef7dd08e37fa

                      SHA512

                      1e224f8b201d77f9df34d5c0b99376ffd001a5b6092a3912fce251a848d22b4f6feeed793bf5e8f3de9371487555e2ec203ce3422ed66251a54e1cb1d0f9b66c

                    • C:\Windows\{F235CC9C-6755-4ad9-ACFF-66A0770E41A4}.exe

                      Filesize

                      60KB

                      MD5

                      748ce49c2c38e4cee14a5d8ad958368a

                      SHA1

                      aabf11b77465d710cde300d46dbb4808ffa73a76

                      SHA256

                      bda8e6dedde37135fe6c1063fb57272c267651f34012f083edfaef7dd08e37fa

                      SHA512

                      1e224f8b201d77f9df34d5c0b99376ffd001a5b6092a3912fce251a848d22b4f6feeed793bf5e8f3de9371487555e2ec203ce3422ed66251a54e1cb1d0f9b66c