Analysis

  • max time kernel
    160s
  • max time network
    161s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    02-11-2023 13:32

General

  • Target

    NEAS.fe3bb50986a528b9bb04f7e056d8d3c0_JC.exe

  • Size

    1.5MB

  • MD5

    fe3bb50986a528b9bb04f7e056d8d3c0

  • SHA1

    15155ecf77a7b7f3d0eece76fc986769e696d373

  • SHA256

    e53f273b75d83a4101e23605dec2876ea5513f459c3c388c8a58944dc2491002

  • SHA512

    934972e64bd596c901658bb1e72d983f66616305ebb71e02ee2adfd7ac9b59c2f36dde3ac1e13b55fc248cfa87ac884f3ab36d4bf58db01f7b74044735667b4a

  • SSDEEP

    24576:pxWVeyRYWc40RDI1pE25HLaHh3NXYtVvMGNAOfBPCQgtkBfodSq:p8YWl3wWo5KkGNA+CQikBfOSq

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Checks processor information in registry 2 TTPs 15 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.fe3bb50986a528b9bb04f7e056d8d3c0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.fe3bb50986a528b9bb04f7e056d8d3c0_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2452
    • \??\c:\program files (x86)\common files\microsoft shared\ink\ja-jp\operatinginkobj.exe
      "c:\program files (x86)\common files\microsoft shared\ink\ja-jp\operatinginkobj.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:848
    • \??\c:\program files (x86)\common files\system\ole db\it-it\operativomsdaorar.exe
      "c:\program files (x86)\common files\system\ole db\it-it\operativomsdaorar.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:2312
    • \??\c:\program files (x86)\adobe\reader 9.0\reader\plug_ins\ebookmakeaccessible.exe
      "c:\program files (x86)\adobe\reader 9.0\reader\plug_ins\ebookmakeaccessible.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:2268
    • \??\c:\program files (x86)\common files\system\ja-jp\windowsmicrosoft.exe
      "c:\program files (x86)\common files\system\ja-jp\windowsmicrosoft.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:2628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\eBookMakeAccessible.exe

    Filesize

    1.5MB

    MD5

    fe3bb50986a528b9bb04f7e056d8d3c0

    SHA1

    15155ecf77a7b7f3d0eece76fc986769e696d373

    SHA256

    e53f273b75d83a4101e23605dec2876ea5513f459c3c388c8a58944dc2491002

    SHA512

    934972e64bd596c901658bb1e72d983f66616305ebb71e02ee2adfd7ac9b59c2f36dde3ac1e13b55fc248cfa87ac884f3ab36d4bf58db01f7b74044735667b4a

  • C:\Program Files (x86)\Common Files\System\Ole DB\it-IT\operativomsdaorar.exe

    Filesize

    1.5MB

    MD5

    8f089687b0736a4c2b4cb0e144824a37

    SHA1

    e432228849421b8ca1aa64ec353e534413024666

    SHA256

    69e950b02e37f0940a515a81207ff2f50ae00658abdaf2a6493e53ecde84aff2

    SHA512

    a929bb45e1afd6c12d35e377af9e6e0ad9b583485163c4fc623caf0a0fe014e369c37d5d42dfba1396dabf0f7e63d94258cda8c60cedcdf9e3789d7d0fbba2bb

  • C:\Program Files (x86)\Common Files\System\Ole DB\it-IT\operativomsdaorar.exe

    Filesize

    1.5MB

    MD5

    8f089687b0736a4c2b4cb0e144824a37

    SHA1

    e432228849421b8ca1aa64ec353e534413024666

    SHA256

    69e950b02e37f0940a515a81207ff2f50ae00658abdaf2a6493e53ecde84aff2

    SHA512

    a929bb45e1afd6c12d35e377af9e6e0ad9b583485163c4fc623caf0a0fe014e369c37d5d42dfba1396dabf0f7e63d94258cda8c60cedcdf9e3789d7d0fbba2bb

  • C:\Program Files (x86)\Common Files\System\ja-JP\WindowsMicrosoft.exe

    Filesize

    1.5MB

    MD5

    fe3bb50986a528b9bb04f7e056d8d3c0

    SHA1

    15155ecf77a7b7f3d0eece76fc986769e696d373

    SHA256

    e53f273b75d83a4101e23605dec2876ea5513f459c3c388c8a58944dc2491002

    SHA512

    934972e64bd596c901658bb1e72d983f66616305ebb71e02ee2adfd7ac9b59c2f36dde3ac1e13b55fc248cfa87ac884f3ab36d4bf58db01f7b74044735667b4a

  • C:\Program Files (x86)\Common Files\microsoft shared\ink\ja-JP\OperatingInkObj.exe

    Filesize

    1.5MB

    MD5

    fe3bb50986a528b9bb04f7e056d8d3c0

    SHA1

    15155ecf77a7b7f3d0eece76fc986769e696d373

    SHA256

    e53f273b75d83a4101e23605dec2876ea5513f459c3c388c8a58944dc2491002

    SHA512

    934972e64bd596c901658bb1e72d983f66616305ebb71e02ee2adfd7ac9b59c2f36dde3ac1e13b55fc248cfa87ac884f3ab36d4bf58db01f7b74044735667b4a

  • C:\Program Files (x86)\Common Files\microsoft shared\ink\ja-JP\OperatingInkObj.exe

    Filesize

    1.5MB

    MD5

    fe3bb50986a528b9bb04f7e056d8d3c0

    SHA1

    15155ecf77a7b7f3d0eece76fc986769e696d373

    SHA256

    e53f273b75d83a4101e23605dec2876ea5513f459c3c388c8a58944dc2491002

    SHA512

    934972e64bd596c901658bb1e72d983f66616305ebb71e02ee2adfd7ac9b59c2f36dde3ac1e13b55fc248cfa87ac884f3ab36d4bf58db01f7b74044735667b4a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VSQV6XDQ\getfile[2].htm

    Filesize

    40KB

    MD5

    74f246bf9ec6cb0bcbffbad1aee8a7bd

    SHA1

    b88b42c5cceaf4f99a9658699da4b2264297a7b6

    SHA256

    fd85c8388b3bc0ecf3af98065af7cf2d970fb9680c858f650beecfc06def5325

    SHA512

    9d6bca032c10f39cad62069da8bb13823205317a1e04190992a9c93fd536cbf6f8d1d19359cdb6365283fb9f6223796ed3285028731509f9e2a1b4361ecd473d

  • \Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\eBookMakeAccessible.exe

    Filesize

    1.5MB

    MD5

    fe3bb50986a528b9bb04f7e056d8d3c0

    SHA1

    15155ecf77a7b7f3d0eece76fc986769e696d373

    SHA256

    e53f273b75d83a4101e23605dec2876ea5513f459c3c388c8a58944dc2491002

    SHA512

    934972e64bd596c901658bb1e72d983f66616305ebb71e02ee2adfd7ac9b59c2f36dde3ac1e13b55fc248cfa87ac884f3ab36d4bf58db01f7b74044735667b4a

  • \Program Files (x86)\Common Files\System\Ole DB\it-IT\operativomsdaorar.exe

    Filesize

    1.5MB

    MD5

    8f089687b0736a4c2b4cb0e144824a37

    SHA1

    e432228849421b8ca1aa64ec353e534413024666

    SHA256

    69e950b02e37f0940a515a81207ff2f50ae00658abdaf2a6493e53ecde84aff2

    SHA512

    a929bb45e1afd6c12d35e377af9e6e0ad9b583485163c4fc623caf0a0fe014e369c37d5d42dfba1396dabf0f7e63d94258cda8c60cedcdf9e3789d7d0fbba2bb

  • \Program Files (x86)\Common Files\System\ja-JP\WindowsMicrosoft.exe

    Filesize

    1.5MB

    MD5

    fe3bb50986a528b9bb04f7e056d8d3c0

    SHA1

    15155ecf77a7b7f3d0eece76fc986769e696d373

    SHA256

    e53f273b75d83a4101e23605dec2876ea5513f459c3c388c8a58944dc2491002

    SHA512

    934972e64bd596c901658bb1e72d983f66616305ebb71e02ee2adfd7ac9b59c2f36dde3ac1e13b55fc248cfa87ac884f3ab36d4bf58db01f7b74044735667b4a

  • \Program Files (x86)\Common Files\microsoft shared\ink\ja-JP\OperatingInkObj.exe

    Filesize

    1.5MB

    MD5

    fe3bb50986a528b9bb04f7e056d8d3c0

    SHA1

    15155ecf77a7b7f3d0eece76fc986769e696d373

    SHA256

    e53f273b75d83a4101e23605dec2876ea5513f459c3c388c8a58944dc2491002

    SHA512

    934972e64bd596c901658bb1e72d983f66616305ebb71e02ee2adfd7ac9b59c2f36dde3ac1e13b55fc248cfa87ac884f3ab36d4bf58db01f7b74044735667b4a