Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/11/2023, 05:06

General

  • Target

    NEAS.7e3d8ec59ac0782fd6b55877cfd468f0_JC.exe

  • Size

    119KB

  • MD5

    7e3d8ec59ac0782fd6b55877cfd468f0

  • SHA1

    dc23ad895628b322ee13686f432929b9d8e4f055

  • SHA256

    5efd87e83e114f59e19ab25eb2aabd12a96b4c1e7e31b6bbc21ddcf6a2500b22

  • SHA512

    ca89da0b8f16e9367ab4b1f03e212af52aec9ab08807339c27e9568ebc4c50c38a32788c2b3f5ebc21ab2c8b5471d34d4fb317175eac55f2a7ee5f56dd1abbe6

  • SSDEEP

    3072:onWFmCcM14fuCsvPXHhDLoPzd1d6jQHLX3:oWFh6fujvvBDL2x1AgX3

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 38 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.7e3d8ec59ac0782fd6b55877cfd468f0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.7e3d8ec59ac0782fd6b55877cfd468f0_JC.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4916
    • C:\Windows\SysWOW64\urdvxc.exe
      C:\Windows\system32\urdvxc.exe /installservice
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:1420
    • C:\Windows\SysWOW64\urdvxc.exe
      C:\Windows\system32\urdvxc.exe /start
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      PID:3884
    • C:\Windows\SysWOW64\urdvxc.exe
      C:\Windows\system32\urdvxc.exe /uninstallservice patch:C:\Users\Admin\AppData\Local\Temp\NEAS.7e3d8ec59ac0782fd6b55877cfd468f0_JC.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies registry class
      PID:4752
  • C:\Windows\SysWOW64\urdvxc.exe
    "C:\Windows\SysWOW64\urdvxc.exe" /service
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies registry class
    PID:4836
  • C:\Windows\SysWOW64\urdvxc.exe
    "C:\Windows\SysWOW64\urdvxc.exe" /service
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies registry class
    PID:1876

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\urdvxc.exe

          Filesize

          119KB

          MD5

          7e3d8ec59ac0782fd6b55877cfd468f0

          SHA1

          dc23ad895628b322ee13686f432929b9d8e4f055

          SHA256

          5efd87e83e114f59e19ab25eb2aabd12a96b4c1e7e31b6bbc21ddcf6a2500b22

          SHA512

          ca89da0b8f16e9367ab4b1f03e212af52aec9ab08807339c27e9568ebc4c50c38a32788c2b3f5ebc21ab2c8b5471d34d4fb317175eac55f2a7ee5f56dd1abbe6

        • C:\Windows\SysWOW64\urdvxc.exe

          Filesize

          119KB

          MD5

          7e3d8ec59ac0782fd6b55877cfd468f0

          SHA1

          dc23ad895628b322ee13686f432929b9d8e4f055

          SHA256

          5efd87e83e114f59e19ab25eb2aabd12a96b4c1e7e31b6bbc21ddcf6a2500b22

          SHA512

          ca89da0b8f16e9367ab4b1f03e212af52aec9ab08807339c27e9568ebc4c50c38a32788c2b3f5ebc21ab2c8b5471d34d4fb317175eac55f2a7ee5f56dd1abbe6

        • C:\Windows\SysWOW64\urdvxc.exe

          Filesize

          119KB

          MD5

          7e3d8ec59ac0782fd6b55877cfd468f0

          SHA1

          dc23ad895628b322ee13686f432929b9d8e4f055

          SHA256

          5efd87e83e114f59e19ab25eb2aabd12a96b4c1e7e31b6bbc21ddcf6a2500b22

          SHA512

          ca89da0b8f16e9367ab4b1f03e212af52aec9ab08807339c27e9568ebc4c50c38a32788c2b3f5ebc21ab2c8b5471d34d4fb317175eac55f2a7ee5f56dd1abbe6

        • C:\Windows\SysWOW64\urdvxc.exe

          Filesize

          119KB

          MD5

          7e3d8ec59ac0782fd6b55877cfd468f0

          SHA1

          dc23ad895628b322ee13686f432929b9d8e4f055

          SHA256

          5efd87e83e114f59e19ab25eb2aabd12a96b4c1e7e31b6bbc21ddcf6a2500b22

          SHA512

          ca89da0b8f16e9367ab4b1f03e212af52aec9ab08807339c27e9568ebc4c50c38a32788c2b3f5ebc21ab2c8b5471d34d4fb317175eac55f2a7ee5f56dd1abbe6

        • C:\Windows\SysWOW64\urdvxc.exe

          Filesize

          119KB

          MD5

          7e3d8ec59ac0782fd6b55877cfd468f0

          SHA1

          dc23ad895628b322ee13686f432929b9d8e4f055

          SHA256

          5efd87e83e114f59e19ab25eb2aabd12a96b4c1e7e31b6bbc21ddcf6a2500b22

          SHA512

          ca89da0b8f16e9367ab4b1f03e212af52aec9ab08807339c27e9568ebc4c50c38a32788c2b3f5ebc21ab2c8b5471d34d4fb317175eac55f2a7ee5f56dd1abbe6

        • C:\Windows\SysWOW64\urdvxc.exe

          Filesize

          119KB

          MD5

          7e3d8ec59ac0782fd6b55877cfd468f0

          SHA1

          dc23ad895628b322ee13686f432929b9d8e4f055

          SHA256

          5efd87e83e114f59e19ab25eb2aabd12a96b4c1e7e31b6bbc21ddcf6a2500b22

          SHA512

          ca89da0b8f16e9367ab4b1f03e212af52aec9ab08807339c27e9568ebc4c50c38a32788c2b3f5ebc21ab2c8b5471d34d4fb317175eac55f2a7ee5f56dd1abbe6

        • memory/1420-8-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/1420-7-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1420-6-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/1876-5998-0x00000000001C0000-0x00000000001DF000-memory.dmp

          Filesize

          124KB

        • memory/3884-10-0x00000000001C0000-0x00000000001DF000-memory.dmp

          Filesize

          124KB

        • memory/3884-13-0x00000000001C0000-0x00000000001DF000-memory.dmp

          Filesize

          124KB

        • memory/4752-35-0x00000000001C0000-0x00000000001DF000-memory.dmp

          Filesize

          124KB

        • memory/4836-43-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-53-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-22-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-23-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-24-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-25-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-26-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-27-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-28-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-29-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-30-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-31-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-20-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-32-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-12-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-14-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-5610-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-18-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-36-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-37-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-38-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-39-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-40-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-41-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-42-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-15-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-44-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-45-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-46-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-47-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-48-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-49-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-52-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-21-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-54-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-55-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-56-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-57-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-58-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-59-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-60-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-61-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-62-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-63-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-64-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-65-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-66-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-67-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-68-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-69-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-70-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-71-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-72-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-73-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-74-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-75-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-76-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-77-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-78-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-79-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-80-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4836-364-0x00000000001E0000-0x00000000001FF000-memory.dmp

          Filesize

          124KB

        • memory/4916-34-0x0000000000610000-0x000000000062F000-memory.dmp

          Filesize

          124KB

        • memory/4916-1-0x0000000000610000-0x000000000062F000-memory.dmp

          Filesize

          124KB

        • memory/4916-0-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB