Analysis
-
max time kernel
164s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2023 03:17
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.140f5df7834d03db0146ec779058b950_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.140f5df7834d03db0146ec779058b950_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.140f5df7834d03db0146ec779058b950_JC.exe
-
Size
835KB
-
MD5
140f5df7834d03db0146ec779058b950
-
SHA1
eefb6ed472e37e4757e7a86da7a61d9f4e9e5e4d
-
SHA256
4db8bca8cf450e8d47460a6de19602f9748501f7165127e1dc1f7c2bcf144a03
-
SHA512
ebac36f83cf55c45485588bc1bf06b113c0d61908545027ec0fa1e2dc7684462a1e99e75898ef7413c5cc86c3be696fc3ef2dca54622a02f74e708606e3664fb
-
SSDEEP
24576:yWPPdoP7d3BFMukWMG+gcXh6dvrBV1gerPxHxmbuio8Tk3Qy0HyNtK35KO:ysTTG+g+h6dvrBV1gerPxHxmbuio8g3k
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2332 u.dll 4392 mpress.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000_Classes\Local Settings calc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1748 OpenWith.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3216 wrote to memory of 5036 3216 NEAS.140f5df7834d03db0146ec779058b950_JC.exe 87 PID 3216 wrote to memory of 5036 3216 NEAS.140f5df7834d03db0146ec779058b950_JC.exe 87 PID 3216 wrote to memory of 5036 3216 NEAS.140f5df7834d03db0146ec779058b950_JC.exe 87 PID 5036 wrote to memory of 2332 5036 cmd.exe 88 PID 5036 wrote to memory of 2332 5036 cmd.exe 88 PID 5036 wrote to memory of 2332 5036 cmd.exe 88 PID 2332 wrote to memory of 4392 2332 u.dll 89 PID 2332 wrote to memory of 4392 2332 u.dll 89 PID 2332 wrote to memory of 4392 2332 u.dll 89 PID 5036 wrote to memory of 460 5036 cmd.exe 92 PID 5036 wrote to memory of 460 5036 cmd.exe 92 PID 5036 wrote to memory of 460 5036 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.140f5df7834d03db0146ec779058b950_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.140f5df7834d03db0146ec779058b950_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\C265.tmp\vir.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save NEAS.140f5df7834d03db0146ec779058b950_JC.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\C786.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\C786.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exeC787.tmp"4⤵
- Executes dropped EXE
PID:4392
-
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵
- Modifies registry class
PID:460
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1748
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56e19184d15c3b72f45d50cf59e0d98ad
SHA1179bf041f4568279c9e2795dd5d6b223c029c9b4
SHA256084dfa3db289f5fc85c57a41c8cc27d6211a0d8ac5926b13e2e2698fae1b86bc
SHA51298a5e1cfc4db80e378587d5d9e32d43cd04cf347360d7d7745229134c7409ab1a85f6b1d50f1fa70d5067034930b0f01e9bcd22b4516a7c73d0ccd70ada95e20
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e
-
Filesize
41KB
MD59bd522b330cdb9f981a2e9ee237a5ec1
SHA178a1140de0c99b114ac069ce6f4e3d8d4aa6d337
SHA25613bf3150689e623156503b5592d21357a34e7201e3bfc953b292179f7151ab25
SHA512e38d6517e6abd4de1dbb95ca508667d2e5e393287fd5b0c77c35f7b642bee511b73abb7941886669ed2525ffbe1db8dac741dd5526b9c49ca13566ea57a4658b
-
Filesize
41KB
MD5233b3e39f58999357ecdde1b8892b2ae
SHA1cc029dba8aba668b9d64aff4bfadc71f5cca96e7
SHA256b5698a6c5e2ba58474807b1807151f3cd7974cb63bce9ed80981e970c3a01125
SHA512af56faeab334e91d38799b155dde5e2acc336f1e0e07232712ffae89cfab5bd7a4a978d86a49ff5445fcd18084a7ce1af68ce918d3cf06d945e66321b8237b1f
-
Filesize
41KB
MD5233b3e39f58999357ecdde1b8892b2ae
SHA1cc029dba8aba668b9d64aff4bfadc71f5cca96e7
SHA256b5698a6c5e2ba58474807b1807151f3cd7974cb63bce9ed80981e970c3a01125
SHA512af56faeab334e91d38799b155dde5e2acc336f1e0e07232712ffae89cfab5bd7a4a978d86a49ff5445fcd18084a7ce1af68ce918d3cf06d945e66321b8237b1f
-
Filesize
24KB
MD5d5d7a500ce4cfe0adb20c5b06b2b23b5
SHA1d26f769434c7d6642dd613d18b51855fe6404358
SHA256d85cc75acb93aa2563a96620ce29a9219c11956cba77d5008f8582014f288354
SHA5122bea70748e0f8008599482510e40104a5a5eb4c2ebb0a64c2a83ddf59a7f9f067d412c5a2165d0967ed10dcd8aa22156758d53ae78940bf3546e843e36718892
-
Filesize
24KB
MD5d5d7a500ce4cfe0adb20c5b06b2b23b5
SHA1d26f769434c7d6642dd613d18b51855fe6404358
SHA256d85cc75acb93aa2563a96620ce29a9219c11956cba77d5008f8582014f288354
SHA5122bea70748e0f8008599482510e40104a5a5eb4c2ebb0a64c2a83ddf59a7f9f067d412c5a2165d0967ed10dcd8aa22156758d53ae78940bf3546e843e36718892
-
Filesize
700KB
MD5e6e9eea8477a9cc23e4cf34876f54b3d
SHA1614155afe905c2372ec85626af490047624037c3
SHA2564da245e3bdd01f62fe761abeb4bf0667e08e429baa199d95fe8a7340ec5cfa0b
SHA512c8409e10b60d7a5fefda1e55bb46df2f4c06f96a9e28257680caacfa51b33f6b8a1b6ba50e200afc3fc289db6e26f0bff05c71915cc2cb39d2f99f1eddbb716c
-
Filesize
700KB
MD5e6e9eea8477a9cc23e4cf34876f54b3d
SHA1614155afe905c2372ec85626af490047624037c3
SHA2564da245e3bdd01f62fe761abeb4bf0667e08e429baa199d95fe8a7340ec5cfa0b
SHA512c8409e10b60d7a5fefda1e55bb46df2f4c06f96a9e28257680caacfa51b33f6b8a1b6ba50e200afc3fc289db6e26f0bff05c71915cc2cb39d2f99f1eddbb716c
-
Filesize
700KB
MD5e6e9eea8477a9cc23e4cf34876f54b3d
SHA1614155afe905c2372ec85626af490047624037c3
SHA2564da245e3bdd01f62fe761abeb4bf0667e08e429baa199d95fe8a7340ec5cfa0b
SHA512c8409e10b60d7a5fefda1e55bb46df2f4c06f96a9e28257680caacfa51b33f6b8a1b6ba50e200afc3fc289db6e26f0bff05c71915cc2cb39d2f99f1eddbb716c
-
Filesize
700KB
MD5e6e9eea8477a9cc23e4cf34876f54b3d
SHA1614155afe905c2372ec85626af490047624037c3
SHA2564da245e3bdd01f62fe761abeb4bf0667e08e429baa199d95fe8a7340ec5cfa0b
SHA512c8409e10b60d7a5fefda1e55bb46df2f4c06f96a9e28257680caacfa51b33f6b8a1b6ba50e200afc3fc289db6e26f0bff05c71915cc2cb39d2f99f1eddbb716c
-
Filesize
2KB
MD5bdc7a002e1d387ee40aaa91ee62fc7d0
SHA1ea39e25bc25439692903238054c1433029c30836
SHA256ddac72202e77ea75502723ac7e00a101da4cf21e1ef047445d42c4aa30dbb210
SHA51211b6bbd8212d5aed657408d4d2ceea0678c7215e366aa8f16654cac84c8cf08e55bc0dd255fe6b5c7e877800a518fda934b9c468fce2dc7518c7852274f34940