Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2023 16:05
Behavioral task
behavioral1
Sample
NEAS.8b0a034d8a6b4afd97a0d22278c27fb0_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.8b0a034d8a6b4afd97a0d22278c27fb0_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.8b0a034d8a6b4afd97a0d22278c27fb0_JC.exe
-
Size
234KB
-
MD5
8b0a034d8a6b4afd97a0d22278c27fb0
-
SHA1
21f495361f6e3b482608e958b360472ed1767bde
-
SHA256
cec8392d9c2d50632f1d28b860fd663c6e9d36d830665d6528975c60a63dd361
-
SHA512
1f1350b0c7e6d60294ddd26ce8cbcac2e52220a975b76a22b5e3f5af3990db9c5a469ad5d75e7f42b8423ab9c41bd232b35756eb8327eb2cba25708c15587655
-
SSDEEP
6144:x2pdqfv2IPOGfXf5ovWJk1abUc19nf5T1:ycrxfP50xc19v
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4896-0-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4896-1-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/files/0x0006000000022e4e-6.dat upx behavioral2/memory/4896-103-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe NEAS.8b0a034d8a6b4afd97a0d22278c27fb0_JC.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234KB
MD58b0a034d8a6b4afd97a0d22278c27fb0
SHA121f495361f6e3b482608e958b360472ed1767bde
SHA256cec8392d9c2d50632f1d28b860fd663c6e9d36d830665d6528975c60a63dd361
SHA5121f1350b0c7e6d60294ddd26ce8cbcac2e52220a975b76a22b5e3f5af3990db9c5a469ad5d75e7f42b8423ab9c41bd232b35756eb8327eb2cba25708c15587655