Analysis
-
max time kernel
134s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
03/11/2023, 10:36
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe
-
Size
387KB
-
MD5
6b3a1b992a5d922cd5078351d34bf5d0
-
SHA1
8ecf6685a2c10aac00494ddcbeccce570e49e8f6
-
SHA256
de3ba15de8962328e31efdea0185ca36ff87e085e360b2fe536df0cbcabc2c33
-
SHA512
a9b867f3afb556443e63fd10547b52ad8a3ff8b5c2a9d1c6b77a75ba4d90d1a65ae45945c25bd6bfde6eee3f9d7b16f9a75084a81ce2b73de0db628b059e37c3
-
SSDEEP
1536:JXBYjfC24mFVsIgvo3X4iZpTha5VlA8mx7aoL8mo:JX+0mFmIgvo4iZhha5rEaoL8z
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2336 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 2220 NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe 2220 NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\f9a81ffa\jusched.exe NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe File created C:\Program Files (x86)\f9a81ffa\f9a81ffa NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe File created C:\Program Files (x86)\f9a81ffa\info_a NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2336 2220 NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe 28 PID 2220 wrote to memory of 2336 2220 NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe 28 PID 2220 wrote to memory of 2336 2220 NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe 28 PID 2220 wrote to memory of 2336 2220 NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\f9a81ffa\jusched.exe"C:\Program Files (x86)\f9a81ffa\jusched.exe"2⤵
- Executes dropped EXE
PID:2336
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD5bff3d8f76e182194c4a2abf1aabba9f3
SHA107e5b604bb505a800b3e0ac16fee483b70595768
SHA2566bc8a4f93eaa1b3e7cfa696855bf6a852cf6555d694bc03e337261a27e58246f
SHA5120c5def3bb01ed166d4135190e131c27be4b6039987e269b6c3fca07677b3c637868397f207df631a098182a6bd3c795e6dd34541f82c5ecd6062441af0af7f50
-
Filesize
12B
MD5f7a7fd6e563bde76327f4ffd3c7f2bf9
SHA12c144e47262d4b0578a435a3e07af9f835cf1fda
SHA25616fe538976c3f36dc9ada8ec11e14e5a33d30402b63ed24c7ed9bbb306d1877d
SHA51273122338b468fb45fd31d25b37e812bbd0d3057e0b7b521663b392117d81bcd9240d30dd2e395c89bee329e23b32ad95ce4208667ad38455965aef43007402b3
-
Filesize
387KB
MD5bd921927bf0a5d805dd48fe7fbaac5f0
SHA19dbbd25c668b6029e1727ec6bba157daf1696728
SHA256e33680e760e1a3078f6306cdbe9c335f2147a86fd649408134dec78d5cf5cda3
SHA5120ed19dd0e072b6917b41551c0e07de0774c1b50f2080f9d5e4a886d67443dec73ebc66340b2615720569d1f403408c15f739f85cad8f53daeb3e1aeb9d29355d
-
Filesize
387KB
MD5bd921927bf0a5d805dd48fe7fbaac5f0
SHA19dbbd25c668b6029e1727ec6bba157daf1696728
SHA256e33680e760e1a3078f6306cdbe9c335f2147a86fd649408134dec78d5cf5cda3
SHA5120ed19dd0e072b6917b41551c0e07de0774c1b50f2080f9d5e4a886d67443dec73ebc66340b2615720569d1f403408c15f739f85cad8f53daeb3e1aeb9d29355d
-
Filesize
387KB
MD5bd921927bf0a5d805dd48fe7fbaac5f0
SHA19dbbd25c668b6029e1727ec6bba157daf1696728
SHA256e33680e760e1a3078f6306cdbe9c335f2147a86fd649408134dec78d5cf5cda3
SHA5120ed19dd0e072b6917b41551c0e07de0774c1b50f2080f9d5e4a886d67443dec73ebc66340b2615720569d1f403408c15f739f85cad8f53daeb3e1aeb9d29355d
-
Filesize
387KB
MD5bd921927bf0a5d805dd48fe7fbaac5f0
SHA19dbbd25c668b6029e1727ec6bba157daf1696728
SHA256e33680e760e1a3078f6306cdbe9c335f2147a86fd649408134dec78d5cf5cda3
SHA5120ed19dd0e072b6917b41551c0e07de0774c1b50f2080f9d5e4a886d67443dec73ebc66340b2615720569d1f403408c15f739f85cad8f53daeb3e1aeb9d29355d