Analysis

  • max time kernel
    134s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    03/11/2023, 10:36

General

  • Target

    NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe

  • Size

    387KB

  • MD5

    6b3a1b992a5d922cd5078351d34bf5d0

  • SHA1

    8ecf6685a2c10aac00494ddcbeccce570e49e8f6

  • SHA256

    de3ba15de8962328e31efdea0185ca36ff87e085e360b2fe536df0cbcabc2c33

  • SHA512

    a9b867f3afb556443e63fd10547b52ad8a3ff8b5c2a9d1c6b77a75ba4d90d1a65ae45945c25bd6bfde6eee3f9d7b16f9a75084a81ce2b73de0db628b059e37c3

  • SSDEEP

    1536:JXBYjfC24mFVsIgvo3X4iZpTha5VlA8mx7aoL8mo:JX+0mFmIgvo4iZhha5rEaoL8z

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Program Files (x86)\f9a81ffa\jusched.exe
      "C:\Program Files (x86)\f9a81ffa\jusched.exe"
      2⤵
      • Executes dropped EXE
      PID:2336

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\f9a81ffa\f9a81ffa

    Filesize

    17B

    MD5

    bff3d8f76e182194c4a2abf1aabba9f3

    SHA1

    07e5b604bb505a800b3e0ac16fee483b70595768

    SHA256

    6bc8a4f93eaa1b3e7cfa696855bf6a852cf6555d694bc03e337261a27e58246f

    SHA512

    0c5def3bb01ed166d4135190e131c27be4b6039987e269b6c3fca07677b3c637868397f207df631a098182a6bd3c795e6dd34541f82c5ecd6062441af0af7f50

  • C:\Program Files (x86)\f9a81ffa\info_a

    Filesize

    12B

    MD5

    f7a7fd6e563bde76327f4ffd3c7f2bf9

    SHA1

    2c144e47262d4b0578a435a3e07af9f835cf1fda

    SHA256

    16fe538976c3f36dc9ada8ec11e14e5a33d30402b63ed24c7ed9bbb306d1877d

    SHA512

    73122338b468fb45fd31d25b37e812bbd0d3057e0b7b521663b392117d81bcd9240d30dd2e395c89bee329e23b32ad95ce4208667ad38455965aef43007402b3

  • C:\Program Files (x86)\f9a81ffa\jusched.exe

    Filesize

    387KB

    MD5

    bd921927bf0a5d805dd48fe7fbaac5f0

    SHA1

    9dbbd25c668b6029e1727ec6bba157daf1696728

    SHA256

    e33680e760e1a3078f6306cdbe9c335f2147a86fd649408134dec78d5cf5cda3

    SHA512

    0ed19dd0e072b6917b41551c0e07de0774c1b50f2080f9d5e4a886d67443dec73ebc66340b2615720569d1f403408c15f739f85cad8f53daeb3e1aeb9d29355d

  • C:\Program Files (x86)\f9a81ffa\jusched.exe

    Filesize

    387KB

    MD5

    bd921927bf0a5d805dd48fe7fbaac5f0

    SHA1

    9dbbd25c668b6029e1727ec6bba157daf1696728

    SHA256

    e33680e760e1a3078f6306cdbe9c335f2147a86fd649408134dec78d5cf5cda3

    SHA512

    0ed19dd0e072b6917b41551c0e07de0774c1b50f2080f9d5e4a886d67443dec73ebc66340b2615720569d1f403408c15f739f85cad8f53daeb3e1aeb9d29355d

  • \Program Files (x86)\f9a81ffa\jusched.exe

    Filesize

    387KB

    MD5

    bd921927bf0a5d805dd48fe7fbaac5f0

    SHA1

    9dbbd25c668b6029e1727ec6bba157daf1696728

    SHA256

    e33680e760e1a3078f6306cdbe9c335f2147a86fd649408134dec78d5cf5cda3

    SHA512

    0ed19dd0e072b6917b41551c0e07de0774c1b50f2080f9d5e4a886d67443dec73ebc66340b2615720569d1f403408c15f739f85cad8f53daeb3e1aeb9d29355d

  • \Program Files (x86)\f9a81ffa\jusched.exe

    Filesize

    387KB

    MD5

    bd921927bf0a5d805dd48fe7fbaac5f0

    SHA1

    9dbbd25c668b6029e1727ec6bba157daf1696728

    SHA256

    e33680e760e1a3078f6306cdbe9c335f2147a86fd649408134dec78d5cf5cda3

    SHA512

    0ed19dd0e072b6917b41551c0e07de0774c1b50f2080f9d5e4a886d67443dec73ebc66340b2615720569d1f403408c15f739f85cad8f53daeb3e1aeb9d29355d

  • memory/2220-0-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2220-8-0x0000000002440000-0x00000000024B2000-memory.dmp

    Filesize

    456KB

  • memory/2220-13-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2220-17-0x0000000002440000-0x00000000024B2000-memory.dmp

    Filesize

    456KB

  • memory/2336-15-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2336-18-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB