Analysis

  • max time kernel
    141s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    03/11/2023, 20:17

General

  • Target

    NEAS.5532cedfcc93e170f1fa8f89dae99d50_JC.exe

  • Size

    2.0MB

  • MD5

    5532cedfcc93e170f1fa8f89dae99d50

  • SHA1

    27ba738d613d0b7c56c3121c49530ebd6e7d3991

  • SHA256

    f1436070cb23e096c98b4c18088d8020208eb63f439bcac4c6721dcabfa3a60b

  • SHA512

    66213be0a706d528fcf5e572492304de4d6532d78d544b8dc05dd2eafd7452f8022cf57c5a89a82215195c2208fa0a1071462a0c90a89e447ee3b5971ec597bf

  • SSDEEP

    49152:oRBKILo69MFGQ7ai7D3xTgOxYwpKWbazR0vKLXZ:a0ILo69MFD2i7D3xkOxYwpKiatuKLXZ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.5532cedfcc93e170f1fa8f89dae99d50_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.5532cedfcc93e170f1fa8f89dae99d50_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1564
    • C:\Users\Admin\AppData\Local\Temp\NEAS.5532cedfcc93e170f1fa8f89dae99d50_JC.exe
      C:\Users\Admin\AppData\Local\Temp\NEAS.5532cedfcc93e170f1fa8f89dae99d50_JC.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2652
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\NEAS.5532cedfcc93e170f1fa8f89dae99d50_JC.exe" /TN OWfbD88d4b3e /F
        3⤵
        • Creates scheduled task(s)
        PID:2700
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN OWfbD88d4b3e > C:\Users\Admin\AppData\Local\Temp\6WgXEJgSs.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2872
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN OWfbD88d4b3e
          4⤵
            PID:2724

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\6WgXEJgSs.xml

      Filesize

      1KB

      MD5

      5f34611760a30cb21de22770b01d30f1

      SHA1

      c6f9aa14b68bb42cd7ff32801037a9fd5c291dda

      SHA256

      79c0b903b59eb417d3989a1fcaea8fe74b0b7448ece0c105efdeaa2b2c7b8294

      SHA512

      01a85b23fe4c9f223ad40529f59cab4c3cc26eeb1737a7ee74d552702b68b6a6036e299a9692eb37a85caee1f64c7cafeac8e0b66bb73b95ae0ab75509d042d8

    • C:\Users\Admin\AppData\Local\Temp\NEAS.5532cedfcc93e170f1fa8f89dae99d50_JC.exe

      Filesize

      2.0MB

      MD5

      8e6c4d162ccae018dbb01a31402b41a6

      SHA1

      8e3f5d7ab59a3436a75319d8055826fc6f7f6efc

      SHA256

      00427164e71e1f25ae37f169d5e90c40bdd98a96f0c4ac32dabef30cee81203d

      SHA512

      2912cad6738a6cf1ec5efb4934564db3e9cf982d182d9deaf6dc8e5aa8e3ac0659abb92945e0983fee44e0a3aab5b61dbee226743d155f83d3f9c180ef574775

    • C:\Users\Admin\AppData\Local\Temp\NEAS.5532cedfcc93e170f1fa8f89dae99d50_JC.exe

      Filesize

      2.0MB

      MD5

      8e6c4d162ccae018dbb01a31402b41a6

      SHA1

      8e3f5d7ab59a3436a75319d8055826fc6f7f6efc

      SHA256

      00427164e71e1f25ae37f169d5e90c40bdd98a96f0c4ac32dabef30cee81203d

      SHA512

      2912cad6738a6cf1ec5efb4934564db3e9cf982d182d9deaf6dc8e5aa8e3ac0659abb92945e0983fee44e0a3aab5b61dbee226743d155f83d3f9c180ef574775

    • \Users\Admin\AppData\Local\Temp\NEAS.5532cedfcc93e170f1fa8f89dae99d50_JC.exe

      Filesize

      2.0MB

      MD5

      8e6c4d162ccae018dbb01a31402b41a6

      SHA1

      8e3f5d7ab59a3436a75319d8055826fc6f7f6efc

      SHA256

      00427164e71e1f25ae37f169d5e90c40bdd98a96f0c4ac32dabef30cee81203d

      SHA512

      2912cad6738a6cf1ec5efb4934564db3e9cf982d182d9deaf6dc8e5aa8e3ac0659abb92945e0983fee44e0a3aab5b61dbee226743d155f83d3f9c180ef574775

    • memory/1564-0-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/1564-16-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/1564-15-0x00000000232E0000-0x000000002353C000-memory.dmp

      Filesize

      2.4MB

    • memory/1564-1-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/1564-2-0x00000000002D0000-0x000000000034E000-memory.dmp

      Filesize

      504KB

    • memory/2652-20-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2652-22-0x0000000022D90000-0x0000000022E0E000-memory.dmp

      Filesize

      504KB

    • memory/2652-26-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2652-31-0x0000000000470000-0x00000000004DB000-memory.dmp

      Filesize

      428KB

    • memory/2652-54-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB