Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
02/11/2023, 09:40
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.85532f1e1166f1b8b1499ac93cc99e20_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.85532f1e1166f1b8b1499ac93cc99e20_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.85532f1e1166f1b8b1499ac93cc99e20_JC.exe
-
Size
82KB
-
MD5
85532f1e1166f1b8b1499ac93cc99e20
-
SHA1
94e3ec70daa0316624fb958cf4d7176a0be5a0f2
-
SHA256
04ec86cc4cde6c42a1291b81b681bd1ae15f93a9b696cd79c6382d5d8402f8bf
-
SHA512
2868be99f4b328cd551c9ca1b156f950bd4075b4d4ff4927bde0a5fac441b48700924d98ca14aa73e3e3c3a56319f5ec19e5b9729b073d98e24cdbc03cf5493f
-
SSDEEP
1536:tdFfoZe6MPMOIN5mEzTjFLW9Ovoh2ZyY0kpc4wgjNZLnqg:tdFfC1LvN5mEHjkOgEAxkpYgjJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1704 NEAS.85532f1e1166f1b8b1499ac93cc99e20_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 1704 NEAS.85532f1e1166f1b8b1499ac93cc99e20_JC.exe -
Loads dropped DLL 1 IoCs
pid Process 536 NEAS.85532f1e1166f1b8b1499ac93cc99e20_JC.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 536 NEAS.85532f1e1166f1b8b1499ac93cc99e20_JC.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 536 NEAS.85532f1e1166f1b8b1499ac93cc99e20_JC.exe 1704 NEAS.85532f1e1166f1b8b1499ac93cc99e20_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 536 wrote to memory of 1704 536 NEAS.85532f1e1166f1b8b1499ac93cc99e20_JC.exe 29 PID 536 wrote to memory of 1704 536 NEAS.85532f1e1166f1b8b1499ac93cc99e20_JC.exe 29 PID 536 wrote to memory of 1704 536 NEAS.85532f1e1166f1b8b1499ac93cc99e20_JC.exe 29 PID 536 wrote to memory of 1704 536 NEAS.85532f1e1166f1b8b1499ac93cc99e20_JC.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.85532f1e1166f1b8b1499ac93cc99e20_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.85532f1e1166f1b8b1499ac93cc99e20_JC.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\NEAS.85532f1e1166f1b8b1499ac93cc99e20_JC.exeC:\Users\Admin\AppData\Local\Temp\NEAS.85532f1e1166f1b8b1499ac93cc99e20_JC.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1704
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5f3774560319020b9bb9350118fecdc9e
SHA11738f9746297156974cb8023a27bc8f4cfbb808d
SHA2560b557b5d53f9221e3245102bb5c06631b72943ef01e2d40d5e8f8693c68ec51b
SHA5121d2022649add67d86c8356e6520b19d8c2a26409ffc07f4a43eea910c223e3b0eac6e778b4663a22b4e51587c480c0ce87f8847fedd0822fec7f82c4a38ddfd1
-
Filesize
82KB
MD5f3774560319020b9bb9350118fecdc9e
SHA11738f9746297156974cb8023a27bc8f4cfbb808d
SHA2560b557b5d53f9221e3245102bb5c06631b72943ef01e2d40d5e8f8693c68ec51b
SHA5121d2022649add67d86c8356e6520b19d8c2a26409ffc07f4a43eea910c223e3b0eac6e778b4663a22b4e51587c480c0ce87f8847fedd0822fec7f82c4a38ddfd1