Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
04-11-2023 10:08
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.fb2dc1bb7b9f9422cace8b76d5bdb8b0_JC.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.fb2dc1bb7b9f9422cace8b76d5bdb8b0_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.fb2dc1bb7b9f9422cace8b76d5bdb8b0_JC.exe
-
Size
320KB
-
MD5
fb2dc1bb7b9f9422cace8b76d5bdb8b0
-
SHA1
81cbaad3ce9f9a4725b68b38c3403c288d73140e
-
SHA256
792f151db0e4e7235c80a3222274d331e413e2086d583bf94bca4899fd060c70
-
SHA512
cd365fc6b253ca1fcd7aeb7b8a0cb42424cfbe038b8e25d7509a4bf878c3b0b540ae5ac4e304e1392bb2369987ae57a0f3e647532ba79a56adadb26cbc76f763
-
SSDEEP
6144:BCdr+DMFlRttDU032i8bidBWkbAGBoG1B7qV40saiigCDN:Ud+DMhDV3POkbA9G1BmVQ5zCDN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2260 NEAS.fb2dc1bb7b9f9422cace8b76d5bdb8b0_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 2260 NEAS.fb2dc1bb7b9f9422cace8b76d5bdb8b0_JC.exe -
Loads dropped DLL 1 IoCs
pid Process 1516 NEAS.fb2dc1bb7b9f9422cace8b76d5bdb8b0_JC.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1516 NEAS.fb2dc1bb7b9f9422cace8b76d5bdb8b0_JC.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2260 NEAS.fb2dc1bb7b9f9422cace8b76d5bdb8b0_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1516 wrote to memory of 2260 1516 NEAS.fb2dc1bb7b9f9422cace8b76d5bdb8b0_JC.exe 29 PID 1516 wrote to memory of 2260 1516 NEAS.fb2dc1bb7b9f9422cace8b76d5bdb8b0_JC.exe 29 PID 1516 wrote to memory of 2260 1516 NEAS.fb2dc1bb7b9f9422cace8b76d5bdb8b0_JC.exe 29 PID 1516 wrote to memory of 2260 1516 NEAS.fb2dc1bb7b9f9422cace8b76d5bdb8b0_JC.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.fb2dc1bb7b9f9422cace8b76d5bdb8b0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.fb2dc1bb7b9f9422cace8b76d5bdb8b0_JC.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\NEAS.fb2dc1bb7b9f9422cace8b76d5bdb8b0_JC.exeC:\Users\Admin\AppData\Local\Temp\NEAS.fb2dc1bb7b9f9422cace8b76d5bdb8b0_JC.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2260
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD56158e1e6be47d5c257a3019e258d60aa
SHA1eff52e5934d3f2599dac3531b8de429e4b45f1ae
SHA256a91e962236b8faa53a798bd6d36b2a5c6c413afd4b6e06cbc91190a612e07b42
SHA5127cf399756fb7fba7861993c7740433d94c021ab98286fc58eb7c9506986cb68981987696e3a3162e21dc102016515c5806ca0f94fe54041f4ab5495d4d27f41a
-
Filesize
320KB
MD56158e1e6be47d5c257a3019e258d60aa
SHA1eff52e5934d3f2599dac3531b8de429e4b45f1ae
SHA256a91e962236b8faa53a798bd6d36b2a5c6c413afd4b6e06cbc91190a612e07b42
SHA5127cf399756fb7fba7861993c7740433d94c021ab98286fc58eb7c9506986cb68981987696e3a3162e21dc102016515c5806ca0f94fe54041f4ab5495d4d27f41a