Analysis
-
max time kernel
158s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2023, 07:21
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.fc164d5dcd9e8ff613ea4a817df09f00_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.fc164d5dcd9e8ff613ea4a817df09f00_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.fc164d5dcd9e8ff613ea4a817df09f00_JC.exe
-
Size
208KB
-
MD5
fc164d5dcd9e8ff613ea4a817df09f00
-
SHA1
da67023657a1e60ffdbce892a85cc46c932b5a43
-
SHA256
9c3f3364507de057526a68fe957e15bca4155e5b536e06bfa4d14c2b9c38147e
-
SHA512
e85a3f3bdd1358bedb49790b1e3bc1fc7adb143a994720556acb2b11eccb1a098195afd2b4658fd2ba966e10c3405da93bf60ed606e599271bd2dbf6507b7517
-
SSDEEP
6144:Zl5wial8dpwZfHStZQitaRqkU9v8VenU:OZtZfHStx6qkU9l
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3000 u.dll 688 mpress.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings calc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4360 OpenWith.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1896 wrote to memory of 1644 1896 NEAS.fc164d5dcd9e8ff613ea4a817df09f00_JC.exe 92 PID 1896 wrote to memory of 1644 1896 NEAS.fc164d5dcd9e8ff613ea4a817df09f00_JC.exe 92 PID 1896 wrote to memory of 1644 1896 NEAS.fc164d5dcd9e8ff613ea4a817df09f00_JC.exe 92 PID 1644 wrote to memory of 3000 1644 cmd.exe 93 PID 1644 wrote to memory of 3000 1644 cmd.exe 93 PID 1644 wrote to memory of 3000 1644 cmd.exe 93 PID 3000 wrote to memory of 688 3000 u.dll 94 PID 3000 wrote to memory of 688 3000 u.dll 94 PID 3000 wrote to memory of 688 3000 u.dll 94 PID 1644 wrote to memory of 2228 1644 cmd.exe 95 PID 1644 wrote to memory of 2228 1644 cmd.exe 95 PID 1644 wrote to memory of 2228 1644 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.fc164d5dcd9e8ff613ea4a817df09f00_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.fc164d5dcd9e8ff613ea4a817df09f00_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7191.tmp\vir.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save NEAS.fc164d5dcd9e8ff613ea4a817df09f00_JC.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\7654.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\7654.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe7655.tmp"4⤵
- Executes dropped EXE
PID:688
-
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵
- Modifies registry class
PID:2228
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4360
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58e2d48ed098ebda44f26535071f23595
SHA19f3551f2ecf8c357792034df6d1b020d20cfd3a4
SHA256c45131ab846830b8f13eafdd98c8a8778711cc5da50ea40ac913a508c64ebadc
SHA5127f5e7f0070594f9206f3b523b3e76b558c81d4b79afdec668a164605c20881c3fe4590fb6b7ec58193118656f7a12fb0c96a881c11839fc546716b92d7bd369a
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e
-
Filesize
41KB
MD50d7c6987ae20b3ffdfb12ed7b308980a
SHA11825c567314cb47598bc6118de46ea915e153be9
SHA2565b1b6a6df41274434d0228ed9f8599412c9a71ffd03c0c8ca670011f6c87e3c0
SHA512be3e223b70228918e03c2ec67478f18ab8a4e2fdefb7256087d3366cb96fcae9c83ceafbe820b82229e1b11b090d0933c1b645fc72ed3715e151108ca2dcc94b
-
Filesize
41KB
MD55a73cf0bca6a70a6556b8b9c5f75a146
SHA182048833120951d0c313d9efddcee9c6fef5f9ab
SHA256f827cab419029c468ce90717f40fa0bf4a717194cb7c76408262cf21d3385177
SHA5125bdcfd190e0be413916bb8972a57f7991c9798427e5a64420997be1ce1c95406049a35e4116e1b7db5fec43c40739505222b3e4265d9310599dabecfbfbf80e6
-
Filesize
41KB
MD55a73cf0bca6a70a6556b8b9c5f75a146
SHA182048833120951d0c313d9efddcee9c6fef5f9ab
SHA256f827cab419029c468ce90717f40fa0bf4a717194cb7c76408262cf21d3385177
SHA5125bdcfd190e0be413916bb8972a57f7991c9798427e5a64420997be1ce1c95406049a35e4116e1b7db5fec43c40739505222b3e4265d9310599dabecfbfbf80e6
-
Filesize
24KB
MD59f9e1d0d42cd5d650c0d9a3f8a067338
SHA1648209302722fb768a10fcec8fb671924d166aa8
SHA25670d0c089bd822e72992d59bdeb17616576bc9aeff1ddd605fcdda518cc77dd73
SHA5126be6fbb2b6b085db17ee22304b0e85d5a4bc5ba62a5b4083834f6f407aedb3a776c33cd4f1bedcbf3eeb50bbc5300d52373a777a7853e9ce56bab89f9aec7ab7
-
Filesize
24KB
MD59f9e1d0d42cd5d650c0d9a3f8a067338
SHA1648209302722fb768a10fcec8fb671924d166aa8
SHA25670d0c089bd822e72992d59bdeb17616576bc9aeff1ddd605fcdda518cc77dd73
SHA5126be6fbb2b6b085db17ee22304b0e85d5a4bc5ba62a5b4083834f6f407aedb3a776c33cd4f1bedcbf3eeb50bbc5300d52373a777a7853e9ce56bab89f9aec7ab7
-
Filesize
700KB
MD5ae87ac1e9b528518386fcce9b8e42476
SHA1fc85b58e7d83c229845ffdb5c1b94bc876f42d41
SHA256becb8df39ed6cdd4ba569f649bc3c7edb11587e88ff6b7be7287ccf0030adddc
SHA5121bd1a706491c541a4f3da109fa6d8a7342a1cbb51954123b58b35851143b55da01180dda9fa16ce6ad1be094c6baa595caef6fd9e6d97f5ab057137ed4643641
-
Filesize
700KB
MD5ae87ac1e9b528518386fcce9b8e42476
SHA1fc85b58e7d83c229845ffdb5c1b94bc876f42d41
SHA256becb8df39ed6cdd4ba569f649bc3c7edb11587e88ff6b7be7287ccf0030adddc
SHA5121bd1a706491c541a4f3da109fa6d8a7342a1cbb51954123b58b35851143b55da01180dda9fa16ce6ad1be094c6baa595caef6fd9e6d97f5ab057137ed4643641
-
Filesize
700KB
MD5ae87ac1e9b528518386fcce9b8e42476
SHA1fc85b58e7d83c229845ffdb5c1b94bc876f42d41
SHA256becb8df39ed6cdd4ba569f649bc3c7edb11587e88ff6b7be7287ccf0030adddc
SHA5121bd1a706491c541a4f3da109fa6d8a7342a1cbb51954123b58b35851143b55da01180dda9fa16ce6ad1be094c6baa595caef6fd9e6d97f5ab057137ed4643641
-
Filesize
700KB
MD5ae87ac1e9b528518386fcce9b8e42476
SHA1fc85b58e7d83c229845ffdb5c1b94bc876f42d41
SHA256becb8df39ed6cdd4ba569f649bc3c7edb11587e88ff6b7be7287ccf0030adddc
SHA5121bd1a706491c541a4f3da109fa6d8a7342a1cbb51954123b58b35851143b55da01180dda9fa16ce6ad1be094c6baa595caef6fd9e6d97f5ab057137ed4643641
-
Filesize
1KB
MD5f67736e9c6cae50a1f7c5a18321340b0
SHA1bd4533c84c071d7c3e8ac54f597f8dc17c443dcb
SHA2565914abaf38bf831888c5969c3d3fb0fab4b795daee03b7f4fb4ed1714d791d47
SHA512782a59b5c8a01eb2b1dec4941f3acfe7a08e6e2f44e40a844321dfab15cca60dfee53ae1299e53e948d2d4bf3f350f19d698f40c74567e41f69db31596638903