Analysis
-
max time kernel
136s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2023 19:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.7ce36402de07b0933c22e43f444102f0_JC.dll
Resource
win7-20231020-en
windows7-x64
2 signatures
150 seconds
General
-
Target
NEAS.7ce36402de07b0933c22e43f444102f0_JC.dll
-
Size
799KB
-
MD5
7ce36402de07b0933c22e43f444102f0
-
SHA1
924ed47e74ca34e375aeb5a626c5a4fa10d2c38d
-
SHA256
1f7b4be973c0e59abcf401b93b0974df871fdda6b9d34cff29c5368eea87caba
-
SHA512
0bec100b89f49723187a434797a9ad2d58ca65bcaa912138691e98db8332c5f63b605439e350bda649f2bd18d9bca171552a680ade3a17416d13223a2ae3f067
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q00:jDgtfRQUHPw06MoV2nwTBlhm8s
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4116 wrote to memory of 1040 4116 rundll32.exe 86 PID 4116 wrote to memory of 1040 4116 rundll32.exe 86 PID 4116 wrote to memory of 1040 4116 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.7ce36402de07b0933c22e43f444102f0_JC.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.7ce36402de07b0933c22e43f444102f0_JC.dll,#12⤵PID:1040
-