Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    04-11-2023 10:08

General

  • Target

    NEAS.fb2dc1bb7b9f9422cace8b76d5bdb8b0_JC.exe

  • Size

    320KB

  • MD5

    fb2dc1bb7b9f9422cace8b76d5bdb8b0

  • SHA1

    81cbaad3ce9f9a4725b68b38c3403c288d73140e

  • SHA256

    792f151db0e4e7235c80a3222274d331e413e2086d583bf94bca4899fd060c70

  • SHA512

    cd365fc6b253ca1fcd7aeb7b8a0cb42424cfbe038b8e25d7509a4bf878c3b0b540ae5ac4e304e1392bb2369987ae57a0f3e647532ba79a56adadb26cbc76f763

  • SSDEEP

    6144:BCdr+DMFlRttDU032i8bidBWkbAGBoG1B7qV40saiigCDN:Ud+DMhDV3POkbA9G1BmVQ5zCDN

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.fb2dc1bb7b9f9422cace8b76d5bdb8b0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.fb2dc1bb7b9f9422cace8b76d5bdb8b0_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Users\Admin\AppData\Local\Temp\NEAS.fb2dc1bb7b9f9422cace8b76d5bdb8b0_JC.exe
      C:\Users\Admin\AppData\Local\Temp\NEAS.fb2dc1bb7b9f9422cace8b76d5bdb8b0_JC.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2260

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\NEAS.fb2dc1bb7b9f9422cace8b76d5bdb8b0_JC.exe

    Filesize

    320KB

    MD5

    6158e1e6be47d5c257a3019e258d60aa

    SHA1

    eff52e5934d3f2599dac3531b8de429e4b45f1ae

    SHA256

    a91e962236b8faa53a798bd6d36b2a5c6c413afd4b6e06cbc91190a612e07b42

    SHA512

    7cf399756fb7fba7861993c7740433d94c021ab98286fc58eb7c9506986cb68981987696e3a3162e21dc102016515c5806ca0f94fe54041f4ab5495d4d27f41a

  • \Users\Admin\AppData\Local\Temp\NEAS.fb2dc1bb7b9f9422cace8b76d5bdb8b0_JC.exe

    Filesize

    320KB

    MD5

    6158e1e6be47d5c257a3019e258d60aa

    SHA1

    eff52e5934d3f2599dac3531b8de429e4b45f1ae

    SHA256

    a91e962236b8faa53a798bd6d36b2a5c6c413afd4b6e06cbc91190a612e07b42

    SHA512

    7cf399756fb7fba7861993c7740433d94c021ab98286fc58eb7c9506986cb68981987696e3a3162e21dc102016515c5806ca0f94fe54041f4ab5495d4d27f41a

  • memory/1516-0-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1516-8-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2260-10-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2260-11-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2260-12-0x0000000000130000-0x000000000016F000-memory.dmp

    Filesize

    252KB

  • memory/2260-17-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB