Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    02-11-2023 08:56

General

  • Target

    NEAS.e279f4db9a67da5a8a8236db2fd54aa0_JC.exe

  • Size

    396KB

  • MD5

    e279f4db9a67da5a8a8236db2fd54aa0

  • SHA1

    4ba2adddadf8534ec714feec6210f0f5449fcba2

  • SHA256

    3b591aee9fb7e8e089f69cc8fe198df85e4e544cca580ec1d8850719b4cdff59

  • SHA512

    bfc6411fda5f956bf54785ca97bfa98f19a5c7d73fdc08071155bb171478a089e4a79118bdae343305560703dd883039c445b1cc3a5e0b79f63b1d439dc7386b

  • SSDEEP

    6144:yXIp3oRtL6q0SNyRSFKYyNU9t0JT8vKArIydVuw3GX1pv7DaPe+1qOWGMcQ1fXRj:y4StL68NWYKYyNUmAv7b4aPb4OWHcQ2

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.e279f4db9a67da5a8a8236db2fd54aa0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.e279f4db9a67da5a8a8236db2fd54aa0_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Users\Admin\qlhaj.exe
      "C:\Users\Admin\qlhaj.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\qlhaj.exe

    Filesize

    396KB

    MD5

    fd320c8f59f01bd0301c3852712350b7

    SHA1

    e5f59e3db15742da7dfccb9a5e0e8cd5dfa0b0d8

    SHA256

    5ea50ae21c6bf0cd8ee4ef341e13e46c90635b89fd1a6682e0f0333c3c855e75

    SHA512

    e688f1bfe51edf251f94e111cdcd5d0561f6475b4b6c6120a78555f201328339a65ccf81f7086ac56465dd5823ed782586c9b2d93a75a4ecefe88bcd533f8b91

  • C:\Users\Admin\qlhaj.exe

    Filesize

    396KB

    MD5

    fd320c8f59f01bd0301c3852712350b7

    SHA1

    e5f59e3db15742da7dfccb9a5e0e8cd5dfa0b0d8

    SHA256

    5ea50ae21c6bf0cd8ee4ef341e13e46c90635b89fd1a6682e0f0333c3c855e75

    SHA512

    e688f1bfe51edf251f94e111cdcd5d0561f6475b4b6c6120a78555f201328339a65ccf81f7086ac56465dd5823ed782586c9b2d93a75a4ecefe88bcd533f8b91

  • C:\Users\Admin\qlhaj.exe

    Filesize

    396KB

    MD5

    fd320c8f59f01bd0301c3852712350b7

    SHA1

    e5f59e3db15742da7dfccb9a5e0e8cd5dfa0b0d8

    SHA256

    5ea50ae21c6bf0cd8ee4ef341e13e46c90635b89fd1a6682e0f0333c3c855e75

    SHA512

    e688f1bfe51edf251f94e111cdcd5d0561f6475b4b6c6120a78555f201328339a65ccf81f7086ac56465dd5823ed782586c9b2d93a75a4ecefe88bcd533f8b91

  • \Users\Admin\qlhaj.exe

    Filesize

    396KB

    MD5

    fd320c8f59f01bd0301c3852712350b7

    SHA1

    e5f59e3db15742da7dfccb9a5e0e8cd5dfa0b0d8

    SHA256

    5ea50ae21c6bf0cd8ee4ef341e13e46c90635b89fd1a6682e0f0333c3c855e75

    SHA512

    e688f1bfe51edf251f94e111cdcd5d0561f6475b4b6c6120a78555f201328339a65ccf81f7086ac56465dd5823ed782586c9b2d93a75a4ecefe88bcd533f8b91

  • \Users\Admin\qlhaj.exe

    Filesize

    396KB

    MD5

    fd320c8f59f01bd0301c3852712350b7

    SHA1

    e5f59e3db15742da7dfccb9a5e0e8cd5dfa0b0d8

    SHA256

    5ea50ae21c6bf0cd8ee4ef341e13e46c90635b89fd1a6682e0f0333c3c855e75

    SHA512

    e688f1bfe51edf251f94e111cdcd5d0561f6475b4b6c6120a78555f201328339a65ccf81f7086ac56465dd5823ed782586c9b2d93a75a4ecefe88bcd533f8b91