Analysis
-
max time kernel
36s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2023, 17:24
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.650b9c6c7b55fdefe2315a74fb9a73a2_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.650b9c6c7b55fdefe2315a74fb9a73a2_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.650b9c6c7b55fdefe2315a74fb9a73a2_JC.exe
-
Size
1.7MB
-
MD5
650b9c6c7b55fdefe2315a74fb9a73a2
-
SHA1
f251b090ef7c7fda8b8bb09552f569faf6004a1b
-
SHA256
f3322bead069396c577a27fd93699d86a43ff76b42b2c77896afceb400b7abbd
-
SHA512
5d4d038f2a362b76b44aa19da81bacb5122d365f29ad5e994e0be33dd8b40cfebdee5541316a85f45bd53cac3c7f2c2c79035369978f8dc934e04da5e4dbd683
-
SSDEEP
24576:M51xWcS9in6bxcqbF8fYTOYKbDurSUQN7kBG+JqJS+WOZseId9x0FOXr2rl+NX:MtWcS4neHbyfYTOYKPu/gEjiEO5ItDdt
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 5000 MSWDM.EXE 2648 MSWDM.EXE 4940 NEAS.650B9C6C7B55FDEFE2315A74FB9A73A2_JC.EXE 3248 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" NEAS.650b9c6c7b55fdefe2315a74fb9a73a2_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" NEAS.650b9c6c7b55fdefe2315a74fb9a73a2_JC.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\devE57E.tmp NEAS.650b9c6c7b55fdefe2315a74fb9a73a2_JC.exe File opened for modification C:\Windows\devE57E.tmp MSWDM.EXE File created C:\WINDOWS\MSWDM.EXE NEAS.650b9c6c7b55fdefe2315a74fb9a73a2_JC.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2648 MSWDM.EXE 2648 MSWDM.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2568 wrote to memory of 5000 2568 NEAS.650b9c6c7b55fdefe2315a74fb9a73a2_JC.exe 87 PID 2568 wrote to memory of 5000 2568 NEAS.650b9c6c7b55fdefe2315a74fb9a73a2_JC.exe 87 PID 2568 wrote to memory of 5000 2568 NEAS.650b9c6c7b55fdefe2315a74fb9a73a2_JC.exe 87 PID 2568 wrote to memory of 2648 2568 NEAS.650b9c6c7b55fdefe2315a74fb9a73a2_JC.exe 88 PID 2568 wrote to memory of 2648 2568 NEAS.650b9c6c7b55fdefe2315a74fb9a73a2_JC.exe 88 PID 2568 wrote to memory of 2648 2568 NEAS.650b9c6c7b55fdefe2315a74fb9a73a2_JC.exe 88 PID 2648 wrote to memory of 4940 2648 MSWDM.EXE 89 PID 2648 wrote to memory of 4940 2648 MSWDM.EXE 89 PID 2648 wrote to memory of 4940 2648 MSWDM.EXE 89 PID 2648 wrote to memory of 3248 2648 MSWDM.EXE 91 PID 2648 wrote to memory of 3248 2648 MSWDM.EXE 91 PID 2648 wrote to memory of 3248 2648 MSWDM.EXE 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.650b9c6c7b55fdefe2315a74fb9a73a2_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.650b9c6c7b55fdefe2315a74fb9a73a2_JC.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5000
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\devE57E.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.650b9c6c7b55fdefe2315a74fb9a73a2_JC.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\NEAS.650B9C6C7B55FDEFE2315A74FB9A73A2_JC.EXE
- Executes dropped EXE
PID:4940
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\devE57E.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.650B9C6C7B55FDEFE2315A74FB9A73A2_JC.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3248
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5c6869ef7211d0efe6f02f498af5f3da3
SHA1581820a9eba088c9a807db758cd448950eeb01ca
SHA256ce685aa3bbf399c950533cf91fc2e24905f99f40b7a3b6656f30c3c55a43a349
SHA5127aa076586148dcf3425da96d17cefed1417cdda1fd3514dd0496b6a792f7591e767762e6318826422754f9a221fc025ed22b281a9745abe1a6f8561987dd2ffa
-
Filesize
1.7MB
MD5c6869ef7211d0efe6f02f498af5f3da3
SHA1581820a9eba088c9a807db758cd448950eeb01ca
SHA256ce685aa3bbf399c950533cf91fc2e24905f99f40b7a3b6656f30c3c55a43a349
SHA5127aa076586148dcf3425da96d17cefed1417cdda1fd3514dd0496b6a792f7591e767762e6318826422754f9a221fc025ed22b281a9745abe1a6f8561987dd2ffa
-
Filesize
96KB
MD5dcb9bf59a0e4a690c759b1755c66cbbd
SHA1839e1b3e98a189c0cc0466e422ee638a187efc1d
SHA256d932ad3629b134d2a88e929f1f17822bb54fa86a47df2e07db1b681e1500717a
SHA512af1f9645dbfe8f2669f3df2f0dc2f4779c1cb8d763e6651eca08e627872040a1cf0baee6bc2aaa76eaa63f165c59689be8c47743229235fe66dd387b7a1a08e6
-
Filesize
1.6MB
MD5c4691f22a5a2277e39025c6b4ca5b73b
SHA19d02101d0732c456701a698ce6602595f526e751
SHA2565d986d56f720e93a96321eda7aba0c7fcbaf2a5a767579d06f76532b50cb5586
SHA51270b878ea99c426f48de0781fb76a55cd42d2e23afc1acc0dbee23842ffc54680de5d43a26f86bd1df724656dd205e58f485bb8c093a95f47a31265e929c2cd8f
-
Filesize
1.6MB
MD5c4691f22a5a2277e39025c6b4ca5b73b
SHA19d02101d0732c456701a698ce6602595f526e751
SHA2565d986d56f720e93a96321eda7aba0c7fcbaf2a5a767579d06f76532b50cb5586
SHA51270b878ea99c426f48de0781fb76a55cd42d2e23afc1acc0dbee23842ffc54680de5d43a26f86bd1df724656dd205e58f485bb8c093a95f47a31265e929c2cd8f
-
Filesize
1.6MB
MD5c4691f22a5a2277e39025c6b4ca5b73b
SHA19d02101d0732c456701a698ce6602595f526e751
SHA2565d986d56f720e93a96321eda7aba0c7fcbaf2a5a767579d06f76532b50cb5586
SHA51270b878ea99c426f48de0781fb76a55cd42d2e23afc1acc0dbee23842ffc54680de5d43a26f86bd1df724656dd205e58f485bb8c093a95f47a31265e929c2cd8f
-
Filesize
1.6MB
MD5c4691f22a5a2277e39025c6b4ca5b73b
SHA19d02101d0732c456701a698ce6602595f526e751
SHA2565d986d56f720e93a96321eda7aba0c7fcbaf2a5a767579d06f76532b50cb5586
SHA51270b878ea99c426f48de0781fb76a55cd42d2e23afc1acc0dbee23842ffc54680de5d43a26f86bd1df724656dd205e58f485bb8c093a95f47a31265e929c2cd8f
-
Filesize
96KB
MD5dcb9bf59a0e4a690c759b1755c66cbbd
SHA1839e1b3e98a189c0cc0466e422ee638a187efc1d
SHA256d932ad3629b134d2a88e929f1f17822bb54fa86a47df2e07db1b681e1500717a
SHA512af1f9645dbfe8f2669f3df2f0dc2f4779c1cb8d763e6651eca08e627872040a1cf0baee6bc2aaa76eaa63f165c59689be8c47743229235fe66dd387b7a1a08e6