Analysis
-
max time kernel
153s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
03/11/2023, 02:55
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.1acb0815cbf6c4f14be2a5e1be03dac0_JC.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.1acb0815cbf6c4f14be2a5e1be03dac0_JC.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.1acb0815cbf6c4f14be2a5e1be03dac0_JC.exe
-
Size
152KB
-
MD5
1acb0815cbf6c4f14be2a5e1be03dac0
-
SHA1
ae3fe61517baec8ffd2dffe51730bad4342ff03d
-
SHA256
34a4dbf3e94f9fd662e17301cdbdd74a0409d3fd3a0f0ea277c1db94e3b41130
-
SHA512
fa0314aa561291166ef16a4ae19836be892ca79eeb88b23caf6e39b0b1b56e9e69b48bb3f80441d6dd75b500714b5f4befe6df2637f47f5837ac545c424e398e
-
SSDEEP
3072:fic5BRJWPoHxVzto9dZZTt2yxD/9YqOnSXcr7jv4:fic5bqJAG/9YN8q
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2092 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2956 NEAS.1acb0815cbf6c4f14be2a5e1be03dac0_JC.exe 2956 NEAS.1acb0815cbf6c4f14be2a5e1be03dac0_JC.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\3300c525 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\3300c525 = "C:\\Windows\\apppatch\\svchost.exe" NEAS.1acb0815cbf6c4f14be2a5e1be03dac0_JC.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\svchost.exe NEAS.1acb0815cbf6c4f14be2a5e1be03dac0_JC.exe File created C:\Windows\apppatch\svchost.exe NEAS.1acb0815cbf6c4f14be2a5e1be03dac0_JC.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe 2092 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2956 NEAS.1acb0815cbf6c4f14be2a5e1be03dac0_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2092 2956 NEAS.1acb0815cbf6c4f14be2a5e1be03dac0_JC.exe 28 PID 2956 wrote to memory of 2092 2956 NEAS.1acb0815cbf6c4f14be2a5e1be03dac0_JC.exe 28 PID 2956 wrote to memory of 2092 2956 NEAS.1acb0815cbf6c4f14be2a5e1be03dac0_JC.exe 28 PID 2956 wrote to memory of 2092 2956 NEAS.1acb0815cbf6c4f14be2a5e1be03dac0_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.1acb0815cbf6c4f14be2a5e1be03dac0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.1acb0815cbf6c4f14be2a5e1be03dac0_JC.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
564B
MD54ba4e86accd290196654455bda682585
SHA1ca3deffb4701fb1e799f3078548d0f3cb2abc8d2
SHA256b6c917fcecf4a574558a7757785fdc7421c6d47b5be35ceade84485ee884b00d
SHA51280bdfe8afd0ec3ea0355a3a15b3f2e214d8fd36193e9ad55a1a262278e4261dda6a799654c7bc935337fdb81cc67c1907edd535c36eb632dc07b3560021011b3
-
Filesize
152KB
MD5f6f87129c933a2cb613d5f9146751b71
SHA133a5b3c3daa4c4ac1c81a80b6da03d854012a085
SHA25636940327ccf98a7d53a3f54d1142f3ee0c03c5c91253bb8927a0dc7be4535a91
SHA512ebd03f701a04f5d763890be50bf0f10e0266ec7537d423be579aea262791426c111f00caaa315d39a8197d4ba86078cef003671a69ebefa77cdf4d7cb62bd802
-
Filesize
152KB
MD5f6f87129c933a2cb613d5f9146751b71
SHA133a5b3c3daa4c4ac1c81a80b6da03d854012a085
SHA25636940327ccf98a7d53a3f54d1142f3ee0c03c5c91253bb8927a0dc7be4535a91
SHA512ebd03f701a04f5d763890be50bf0f10e0266ec7537d423be579aea262791426c111f00caaa315d39a8197d4ba86078cef003671a69ebefa77cdf4d7cb62bd802
-
Filesize
152KB
MD5f6f87129c933a2cb613d5f9146751b71
SHA133a5b3c3daa4c4ac1c81a80b6da03d854012a085
SHA25636940327ccf98a7d53a3f54d1142f3ee0c03c5c91253bb8927a0dc7be4535a91
SHA512ebd03f701a04f5d763890be50bf0f10e0266ec7537d423be579aea262791426c111f00caaa315d39a8197d4ba86078cef003671a69ebefa77cdf4d7cb62bd802
-
Filesize
152KB
MD5f6f87129c933a2cb613d5f9146751b71
SHA133a5b3c3daa4c4ac1c81a80b6da03d854012a085
SHA25636940327ccf98a7d53a3f54d1142f3ee0c03c5c91253bb8927a0dc7be4535a91
SHA512ebd03f701a04f5d763890be50bf0f10e0266ec7537d423be579aea262791426c111f00caaa315d39a8197d4ba86078cef003671a69ebefa77cdf4d7cb62bd802
-
Filesize
152KB
MD5f6f87129c933a2cb613d5f9146751b71
SHA133a5b3c3daa4c4ac1c81a80b6da03d854012a085
SHA25636940327ccf98a7d53a3f54d1142f3ee0c03c5c91253bb8927a0dc7be4535a91
SHA512ebd03f701a04f5d763890be50bf0f10e0266ec7537d423be579aea262791426c111f00caaa315d39a8197d4ba86078cef003671a69ebefa77cdf4d7cb62bd802