Analysis
-
max time kernel
152s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2023 17:03
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.773d3c8eb0bde32676cabfd58515584a_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.773d3c8eb0bde32676cabfd58515584a_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.773d3c8eb0bde32676cabfd58515584a_JC.exe
-
Size
932KB
-
MD5
773d3c8eb0bde32676cabfd58515584a
-
SHA1
629e063e9a999c8365d3698cf0b6111f17e40a05
-
SHA256
1a805d78b044fc48e0e7dd08bf56365b362453cc66fdb18d94ec14af1c6b2155
-
SHA512
0f7807edd271dabf520009181da3316ff5435a9abd1aa1cb06905a0d98e5ce14333f4ab767da77023ea9e171c4e14de1957e476399027ed0e32d715daa7c34fc
-
SSDEEP
24576:N1/aGLDCM4D8ayGMZo8/0/1MqarGhKb/Dxcsl:CD8ayGMZo3/1MqarGePl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2444 wssslm.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\wssslm.exe" wssslm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3556 wrote to memory of 2444 3556 NEAS.773d3c8eb0bde32676cabfd58515584a_JC.exe 86 PID 3556 wrote to memory of 2444 3556 NEAS.773d3c8eb0bde32676cabfd58515584a_JC.exe 86 PID 3556 wrote to memory of 2444 3556 NEAS.773d3c8eb0bde32676cabfd58515584a_JC.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.773d3c8eb0bde32676cabfd58515584a_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.773d3c8eb0bde32676cabfd58515584a_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\ProgramData\wssslm.exe"C:\ProgramData\wssslm.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
932KB
MD5ab82811672449924c45bdbc2e140077e
SHA1afc31fce43d9769f5b362cf5940790fb883448d6
SHA2564b923e21b9b661b6ead70fb9d36f830f9b9214fcb47ff48bb66dfd5ad03f72f3
SHA5123583a413696bd4b85060b8665c28bb58959bc85ba62bd329c33fbebcff311387a65be051649f163667a956ae9edd31cdc8f3137834d554e38643a9961741112f
-
Filesize
477KB
MD5d148c0d0f1c55849ccc9895b0be13ea5
SHA1b80c9d14427b54f7b3cd65e2b7711a04832f1fbf
SHA2565bb38daa3518423a2642ccac0e3d2004fa809b558ca2bf3c9b0e719a75476a58
SHA5128ea21f0a843dd92679edd9da72c780087fd6eef7d3676bb26a7621d3aaf9908f5e25f48697754d967697388d706a10f55c308a94fdcf7375b14cd9b8ffe46d89
-
Filesize
477KB
MD5d148c0d0f1c55849ccc9895b0be13ea5
SHA1b80c9d14427b54f7b3cd65e2b7711a04832f1fbf
SHA2565bb38daa3518423a2642ccac0e3d2004fa809b558ca2bf3c9b0e719a75476a58
SHA5128ea21f0a843dd92679edd9da72c780087fd6eef7d3676bb26a7621d3aaf9908f5e25f48697754d967697388d706a10f55c308a94fdcf7375b14cd9b8ffe46d89
-
Filesize
454KB
MD5e12960c5327526b0c5db16ed5ba0b0cf
SHA143647e410b93b2bf104ed75eb4cc4b71f5ef789a
SHA256b400e2845ed3245f03c3dc1d65d4b1cc1adcf31dbd03ea8cd2f7d39a00364357
SHA51247f71915ea4b8cad212d1caf3e2233b4b85a68731a18c11dbfc83b0a7d4e44c519856635d08841a5c3dfe91fa2113a071a2c28ac70094c2a581bd018a4997dff
-
Filesize
454KB
MD5e12960c5327526b0c5db16ed5ba0b0cf
SHA143647e410b93b2bf104ed75eb4cc4b71f5ef789a
SHA256b400e2845ed3245f03c3dc1d65d4b1cc1adcf31dbd03ea8cd2f7d39a00364357
SHA51247f71915ea4b8cad212d1caf3e2233b4b85a68731a18c11dbfc83b0a7d4e44c519856635d08841a5c3dfe91fa2113a071a2c28ac70094c2a581bd018a4997dff