Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
03/11/2023, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.9ff1887b7c6c4449bf5136491c46ee01_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.9ff1887b7c6c4449bf5136491c46ee01_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.9ff1887b7c6c4449bf5136491c46ee01_JC.exe
-
Size
124KB
-
MD5
9ff1887b7c6c4449bf5136491c46ee01
-
SHA1
c151aa4b54f52969874477cae95e700b91182c15
-
SHA256
b9d9e438f3c230b493c4e04523859bcecdfc829e9e894814315ca46ee18d58aa
-
SHA512
0a21158d7bc950cb9332edadb03f4c182161ffb5c2e55fedb3520cea27020da42ce6a2147fa0dc96abf1f70f0a9e85e1efe6bc12841d90eb1518556aa2b5415e
-
SSDEEP
3072:2q8f/oic1i9uTAlPQSDwEyWefHEvGdxETCpPJ:18f/U1iF/sUGdxET
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2108 NEAS.9ff1887b7c6c4449bf5136491c46ee01_JC.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2108 wrote to memory of 1424 2108 NEAS.9ff1887b7c6c4449bf5136491c46ee01_JC.exe 28 PID 2108 wrote to memory of 1424 2108 NEAS.9ff1887b7c6c4449bf5136491c46ee01_JC.exe 28 PID 2108 wrote to memory of 1424 2108 NEAS.9ff1887b7c6c4449bf5136491c46ee01_JC.exe 28 PID 2108 wrote to memory of 1424 2108 NEAS.9ff1887b7c6c4449bf5136491c46ee01_JC.exe 28 PID 1424 wrote to memory of 2184 1424 cmd.exe 30 PID 1424 wrote to memory of 2184 1424 cmd.exe 30 PID 1424 wrote to memory of 2184 1424 cmd.exe 30 PID 1424 wrote to memory of 2184 1424 cmd.exe 30 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2184 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.9ff1887b7c6c4449bf5136491c46ee01_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.9ff1887b7c6c4449bf5136491c46ee01_JC.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\luo2372.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\NEAS.9ff1887b7c6c4449bf5136491c46ee01_JC.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\NEAS.9ff1887b7c6c4449bf5136491c46ee01_JC.exe"3⤵
- Views/modifies file attributes
PID:2184
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56B
MD5723217be08ca590865accb36fcdc77d6
SHA1904efed464a8b812ef60ac2e06ca20fbc5fceba8
SHA2566ebd1b1f45c24f5c2fb081520b150fd1209c6fdbc174ab8ad8b328f20842e853
SHA5120079e71fa563a49632b5da3753941ec92d62adbf8947994400e7d9ce8dd788bc05950f26acd6d648ad42e4e48de2b4c5d20d277cd94bed0031e364ed940de997
-
Filesize
56B
MD5723217be08ca590865accb36fcdc77d6
SHA1904efed464a8b812ef60ac2e06ca20fbc5fceba8
SHA2566ebd1b1f45c24f5c2fb081520b150fd1209c6fdbc174ab8ad8b328f20842e853
SHA5120079e71fa563a49632b5da3753941ec92d62adbf8947994400e7d9ce8dd788bc05950f26acd6d648ad42e4e48de2b4c5d20d277cd94bed0031e364ed940de997