Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    04/11/2023, 22:35

General

  • Target

    NEAS.011c515bfa5a8aa3307dcfdf05810dd0_JC.exe

  • Size

    967KB

  • MD5

    011c515bfa5a8aa3307dcfdf05810dd0

  • SHA1

    8c887bcda15e02fa2a94ef5ee7d2671abe4c16ac

  • SHA256

    c2b8cacb7afa2814d8e751bdad2984bf1aef06130666c00a9c2b41ce4127bff3

  • SHA512

    6e15750cb1d7d221c6fb49a33b95a43c397cb9294d345f463c9e430ecddac012c28ae18d1650f43ea410224f70a4285d905e8402f2099be6d50b19847ca7b5e3

  • SSDEEP

    24576:OqzKd9mUPBCSmSrRRxFMXwf0YYWJ6dh177eg4Ntf:OqzK9Zjh/LMAVYdhZvEt

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.011c515bfa5a8aa3307dcfdf05810dd0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.011c515bfa5a8aa3307dcfdf05810dd0_JC.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:3016

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3016-0-0x0000000000400000-0x000000000071D000-memory.dmp

          Filesize

          3.1MB

        • memory/3016-1-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/3016-6-0x0000000000400000-0x000000000071D000-memory.dmp

          Filesize

          3.1MB

        • memory/3016-8-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/3016-9-0x0000000000400000-0x000000000071D000-memory.dmp

          Filesize

          3.1MB