Analysis

  • max time kernel
    164s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    03/11/2023, 07:17

General

  • Target

    NEAS.1e07f0ca5cc5f41a0e9506a19c0917d0_JC.exe

  • Size

    545KB

  • MD5

    1e07f0ca5cc5f41a0e9506a19c0917d0

  • SHA1

    55083109b7ca6eb45ca0f83e60e0598d7ece5787

  • SHA256

    c77488deccb7e8483632196b2dcd6e6506b57465382c8bc4b1a67c097cbbc8f3

  • SHA512

    a49878a36c05877a4b1b37e23a774c102f901b29fe341ab655ed8ac8614ec670d12af4eee9c6895517c9bf4b20e8c1aa32c161bc70dfbeb773095cde02f4de64

  • SSDEEP

    6144:/pW2bgbbV28okoS1oWMkdlZQ5iioct0IwdNOut1VP75iphJz9r:/pW2IoioS66gphJz9r

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Disables Task Manager via registry modification
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 13 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.1e07f0ca5cc5f41a0e9506a19c0917d0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.1e07f0ca5cc5f41a0e9506a19c0917d0_JC.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Windows\System32\reg.exe
      "C:\Windows\System32\reg.exe" ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
      2⤵
      • UAC bypass
      • Modifies registry key
      PID:2604
    • C:\Windows\System32\reg.exe
      "C:\Windows\System32\reg.exe" add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
      2⤵
      • Modifies registry key
      PID:1236

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\dHVnoFoEYSh.exe

          Filesize

          545KB

          MD5

          99620014a9065e1ba7b057b1dbdd5fe4

          SHA1

          3fde7f96db6baf5d43cc1fcbe60dfa313d5d202b

          SHA256

          47189fbaa23d70f1da81454c3ed73147edb0a36b1523c56c1b45eee92d5287b5

          SHA512

          5b9ce38cc22b8b5101359e3f232ff341d646c689ed2b0465254651fb5212cecbbce34d15a01070bb78de8bdf89a072e4ddcd5f031acbcf1e38cf8a47048b626a

        • memory/2096-0-0x0000000000F40000-0x0000000000F68000-memory.dmp

          Filesize

          160KB

        • memory/2096-1-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

          Filesize

          9.9MB

        • memory/2096-2-0x000000001B240000-0x000000001B2C0000-memory.dmp

          Filesize

          512KB

        • memory/2096-713-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

          Filesize

          9.9MB

        • memory/2096-785-0x000000001B240000-0x000000001B2C0000-memory.dmp

          Filesize

          512KB