Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
02/11/2023, 10:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.aea111c216a22004223f437a1a1182f0_JC.exe
Resource
win7-20231020-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.aea111c216a22004223f437a1a1182f0_JC.exe
Resource
win10v2004-20231023-en
4 signatures
150 seconds
General
-
Target
NEAS.aea111c216a22004223f437a1a1182f0_JC.exe
-
Size
1.3MB
-
MD5
aea111c216a22004223f437a1a1182f0
-
SHA1
61f3a2516c14e15f34f3d08ae4e34858df6ec163
-
SHA256
ab416fb4584507d2aacae2bac2a1b70265c149f9682f4099c8df1d929e9c29a3
-
SHA512
7a34fc7006ba8c09522abbeecb454fdd517a353e843ba330af958bc8376c34a5dedb69b0a6d5ccd8ae33963ee7ba536adfedcc646c581703d029923f936f4ee6
-
SSDEEP
24576:Gb5kSYaLTVt5e8Z9WE2ah6iHIeCPH3gvKo5hVpBkohxnc:Gb5k2L5OT8ZVqQvhVpeAc
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2352 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1280 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 628 NEAS.aea111c216a22004223f437a1a1182f0_JC.exe 628 NEAS.aea111c216a22004223f437a1a1182f0_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 628 NEAS.aea111c216a22004223f437a1a1182f0_JC.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 628 wrote to memory of 2352 628 NEAS.aea111c216a22004223f437a1a1182f0_JC.exe 28 PID 628 wrote to memory of 2352 628 NEAS.aea111c216a22004223f437a1a1182f0_JC.exe 28 PID 628 wrote to memory of 2352 628 NEAS.aea111c216a22004223f437a1a1182f0_JC.exe 28 PID 2352 wrote to memory of 1280 2352 cmd.exe 30 PID 2352 wrote to memory of 1280 2352 cmd.exe 30 PID 2352 wrote to memory of 1280 2352 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.aea111c216a22004223f437a1a1182f0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.aea111c216a22004223f437a1a1182f0_JC.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\NEAS.aea111c216a22004223f437a1a1182f0_JC.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1280
-
-