Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/11/2023, 10:59

General

  • Target

    NEAS.0137494efffaeaa87b9ae71df7ce0a30_JC.exe

  • Size

    26KB

  • MD5

    0137494efffaeaa87b9ae71df7ce0a30

  • SHA1

    2552c059ad358a178f189547873e300a64692346

  • SHA256

    94d3cedac222eabd0c1449c208576603a01718d571256b7b150327c48596b51c

  • SHA512

    5b77b245f46158b3a96595a35451e4eaa7e8badd53bbf403a61187961b58e1646ffdc0d250ed83fc6f3631baa3ea9d362759e228cb0f67dd32265b52b847e56a

  • SSDEEP

    768:g1ODKAaDMG8H92RwZNQSw+IlJIJJREIOAEeF1:yfgLdQAQfhJIJ0IO61

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3272
      • C:\Users\Admin\AppData\Local\Temp\NEAS.0137494efffaeaa87b9ae71df7ce0a30_JC.exe
        "C:\Users\Admin\AppData\Local\Temp\NEAS.0137494efffaeaa87b9ae71df7ce0a30_JC.exe"
        2⤵
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4160
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2964
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:3988

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        aad56055023e27d2cf4de48e871c1f49

        SHA1

        082598c745a31018b20cb5b8e31c8bd337ff1943

        SHA256

        0a6401f58d61f6213ba895d25655a21548266321f2c9cc3e43bb9aded1e1bfc9

        SHA512

        95bdc927c07e9f302c6e8cc58c49408d71d1020569d2cd8da63ca613138a5b46893447de813034c019eb7284287c1218260af5fcad473b904813ad9f3410e7fe

      • C:\Program Files\Google\Chrome\Application\chrome.exe

        Filesize

        2.8MB

        MD5

        1f69c2c7a451e322a9da46b10d10e491

        SHA1

        cdadb5cc5d9f2493ca23ba1dcba792534446a1d7

        SHA256

        5a8171663208645db5e51677700da963407372f54e7d8cadd0bc42c74d2d41f8

        SHA512

        33f0ce168ab0b07622cb3b0e18e2bfaeef940349268a668b09082226615a5ec7accefa84b71b5ef1b98001d62ed1c7646110d30e478a363a0ea0452311fa21f0

      • F:\$RECYCLE.BIN\S-1-5-21-3350690463-3549324357-1323838019-1000\_desktop.ini

        Filesize

        9B

        MD5

        6029ce528adbc1284163cdd2b27a082e

        SHA1

        a2f23e1d5101c3b6929686a2d5711c2af2dec1b7

        SHA256

        5036deecfbb090aa7f7c21c159b1921df0cf23eedafb7e0c208668ad82872dae

        SHA512

        a661e939e69a59f88fd86fa654371ba4b3e3e8faf5c1b39bdaa0def8b277b26b63e96d4f5eb047ca3d8888597165dc709f395eeaf333c25c9cf56441c31dd676

      • memory/4160-27-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4160-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4160-23-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4160-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4160-13-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4160-128-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4160-1070-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4160-2179-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4160-5-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4160-4565-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB