Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    03/11/2023, 04:38

General

  • Target

    NEAS.9e29374036b0e6137491545d74e4dea0_JC.exe

  • Size

    22KB

  • MD5

    9e29374036b0e6137491545d74e4dea0

  • SHA1

    cb0c66b1ad1a60af6a0385277711fc231c342f7b

  • SHA256

    f94dc990e275dde34e245177042c6707e9d4544f69904475556a13c3650a9bd5

  • SHA512

    be71a6073ebbf997d6970c62687829abb2e360c870ac93e99abb4d0d281a7972ceed65c89304b6105a2a6a7e00007a8242f09d2064700c402fe2febc3b1aa0bb

  • SSDEEP

    384:lrd1jR3l1cbELnrfjoRWwgGZJxSzHRfaF3kACcTMyt9R:NvasrfjGWW0T5alkACcnD

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.9e29374036b0e6137491545d74e4dea0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.9e29374036b0e6137491545d74e4dea0_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2836
    • C:\Users\Admin\AppData\Local\Temp\huro.exe
      "C:\Users\Admin\AppData\Local\Temp\huro.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2692

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\huro.exe

          Filesize

          22KB

          MD5

          a6a9458a34fe964fe671d2b5edbe5b13

          SHA1

          aef2fd17441c7f7a78da752cb6e7fcf368959c57

          SHA256

          9e24741ef2b4d1643df93bb3570c2f3c0f09837719de387094e45b901019ed2a

          SHA512

          4d240d9d1ee03dfc7aa84cf9dd84bf7e4fc7e4ac7a13baed7bf93e4c12a67dac3abfd56bada888ee43c49382d6acd05b2f8503efb2d418fffa7a16d6a5d0574a

        • C:\Users\Admin\AppData\Local\Temp\huro.exe

          Filesize

          22KB

          MD5

          a6a9458a34fe964fe671d2b5edbe5b13

          SHA1

          aef2fd17441c7f7a78da752cb6e7fcf368959c57

          SHA256

          9e24741ef2b4d1643df93bb3570c2f3c0f09837719de387094e45b901019ed2a

          SHA512

          4d240d9d1ee03dfc7aa84cf9dd84bf7e4fc7e4ac7a13baed7bf93e4c12a67dac3abfd56bada888ee43c49382d6acd05b2f8503efb2d418fffa7a16d6a5d0574a

        • \Users\Admin\AppData\Local\Temp\huro.exe

          Filesize

          22KB

          MD5

          a6a9458a34fe964fe671d2b5edbe5b13

          SHA1

          aef2fd17441c7f7a78da752cb6e7fcf368959c57

          SHA256

          9e24741ef2b4d1643df93bb3570c2f3c0f09837719de387094e45b901019ed2a

          SHA512

          4d240d9d1ee03dfc7aa84cf9dd84bf7e4fc7e4ac7a13baed7bf93e4c12a67dac3abfd56bada888ee43c49382d6acd05b2f8503efb2d418fffa7a16d6a5d0574a

        • memory/2692-7-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/2836-0-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB