Analysis

  • max time kernel
    134s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    03-11-2023 21:04

General

  • Target

    NEAS.01d54b15f258a4911c96475119dc5e80_JC.exe

  • Size

    368KB

  • MD5

    01d54b15f258a4911c96475119dc5e80

  • SHA1

    63e9241f3c2541231406648750dbf553c467c418

  • SHA256

    1c26c73ad4aa03f9379104de55f94d4f75e7c889f5bff447a4a0eedab336c1ad

  • SHA512

    96ad4fb1c471635fcde5e6ebda1d85432aa6bc6f85fae85cc506c5f7ef9141dd33f813d6ab329f830a5440feb50a4572d549a59ff4351ff648631d00ee9cf3d0

  • SSDEEP

    6144:DWpkbJvLBgM4QoRmQ3BxbEhlgB+djvXHQ5bjVO8x5BY0:8I1LBg9QoRmQxxbylqgvXHQbOm5J

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.01d54b15f258a4911c96475119dc5e80_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.01d54b15f258a4911c96475119dc5e80_JC.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\wee3AB0.tmp

    Filesize

    262KB

    MD5

    a0840b6ee26791ef32068e0629bf9801

    SHA1

    574bb311577db0707fcf413f5f6f65214a17413c

    SHA256

    706f10b3a6c08f756fd758a23e882ec6971bab470e2d67b3ddddf4ba43d17e34

    SHA512

    d190e8f2b39ea0c61824393a4972dba1ab6aed708ecacf918abf1a62a17a806c7792c1a3d5ef3264ea16b6fe534761efc15e8eb15ba60e7620832867a14766db

  • \Users\Admin\AppData\Local\Temp\wee3AB0.tmp

    Filesize

    262KB

    MD5

    a0840b6ee26791ef32068e0629bf9801

    SHA1

    574bb311577db0707fcf413f5f6f65214a17413c

    SHA256

    706f10b3a6c08f756fd758a23e882ec6971bab470e2d67b3ddddf4ba43d17e34

    SHA512

    d190e8f2b39ea0c61824393a4972dba1ab6aed708ecacf918abf1a62a17a806c7792c1a3d5ef3264ea16b6fe534761efc15e8eb15ba60e7620832867a14766db

  • memory/860-2-0x0000000000340000-0x0000000000386000-memory.dmp

    Filesize

    280KB

  • memory/860-3-0x0000000074340000-0x0000000074A2E000-memory.dmp

    Filesize

    6.9MB

  • memory/860-4-0x0000000004C50000-0x0000000004C90000-memory.dmp

    Filesize

    256KB

  • memory/860-5-0x0000000004C50000-0x0000000004C90000-memory.dmp

    Filesize

    256KB

  • memory/860-6-0x0000000004C50000-0x0000000004C90000-memory.dmp

    Filesize

    256KB

  • memory/860-9-0x000000000A230000-0x000000000A9D6000-memory.dmp

    Filesize

    7.6MB

  • memory/860-17-0x0000000074340000-0x0000000074A2E000-memory.dmp

    Filesize

    6.9MB

  • memory/860-18-0x0000000004C50000-0x0000000004C90000-memory.dmp

    Filesize

    256KB