Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/11/2023, 19:05

General

  • Target

    NEAS.10fe0545906e5b7fe5d8957d8490a590_JC.exe

  • Size

    1011KB

  • MD5

    10fe0545906e5b7fe5d8957d8490a590

  • SHA1

    2160a46256e5c42a841119536404e0c902ab40de

  • SHA256

    134ab10f5c16c46f9290d2c031a9d83adef5f36d7c82f7472778f479669ffaf5

  • SHA512

    edc56c298a6924c5ccaf97a4609d823c196299bd6d3c1370fdfe649c34363ca917802d1c51cdbcef50b3f47d4844c87cdf42078e98ba38e6e70f875d75873209

  • SSDEEP

    24576:jiur4LUgziur4LUgziur4LUgziur4LUgziur4LUg+iur4LUgx:jbrZObrZObrZObrZObrZHbrZE

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.10fe0545906e5b7fe5d8957d8490a590_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.10fe0545906e5b7fe5d8957d8490a590_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5112
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe" /C wmic bios get serialnumber
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4196
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2692
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe" /C echo %computername%
      2⤵
        PID:2232
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /C getmac /fo list | Find "Physical Address"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4420
        • C:\Windows\system32\getmac.exe
          getmac /fo list
          3⤵
            PID:3472
          • C:\Windows\system32\find.exe
            Find "Physical Address"
            3⤵
              PID:916
          • C:\Windows\SYSTEM32\cmd.exe
            "cmd.exe" /C dir /b C:\Users\Public\Desktop | find "AX_PROD"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4072
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" dir /b C:\Users\Public\Desktop "
              3⤵
                PID:1824
              • C:\Windows\system32\find.exe
                find "AX_PROD"
                3⤵
                  PID:4248
              • C:\Windows\SYSTEM32\cmd.exe
                "cmd.exe" /C dir /b C:\Users\Public\Desktop | find "Retail POS"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:3940
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" dir /b C:\Users\Public\Desktop "
                  3⤵
                    PID:632
                  • C:\Windows\system32\find.exe
                    find "Retail POS"
                    3⤵
                      PID:2464
                  • C:\Windows\SYSTEM32\cmd.exe
                    "cmd.exe" /C dir /b C:\Users\axdcr\Desktop | find "AX_PROD"
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2564
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" dir /b C:\Users\axdcr\Desktop "
                      3⤵
                        PID:4988
                      • C:\Windows\system32\find.exe
                        find "AX_PROD"
                        3⤵
                          PID:3804
                      • C:\Windows\SYSTEM32\cmd.exe
                        "cmd.exe" /C dir /b C:\Users\axdcr\Desktop | find "Retail POS"
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:4968
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" dir /b C:\Users\axdcr\Desktop "
                          3⤵
                            PID:4536
                          • C:\Windows\system32\find.exe
                            find "Retail POS"
                            3⤵
                              PID:4276
                          • C:\Windows\SYSTEM32\cmd.exe
                            "cmd.exe" /C dir /b C:\"Program Files (x86)"\HPGFulltaxVRF | find "HPGFulltaxVRF"
                            2⤵
                            • Suspicious use of WriteProcessMemory
                            PID:1048
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /S /D /c" dir /b C:\"Program Files (x86)"\HPGFulltaxVRF "
                              3⤵
                                PID:5028
                              • C:\Windows\system32\find.exe
                                find "HPGFulltaxVRF"
                                3⤵
                                  PID:3064
                              • C:\Windows\SYSTEM32\cmd.exe
                                "cmd.exe" /C dir /b C:\"Program Files"\HPGFulltaxVRF | find "HPGFulltaxVRF"
                                2⤵
                                • Suspicious use of WriteProcessMemory
                                PID:1624
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /S /D /c" dir /b C:\"Program Files"\HPGFulltaxVRF "
                                  3⤵
                                    PID:3324
                                  • C:\Windows\system32\find.exe
                                    find "HPGFulltaxVRF"
                                    3⤵
                                      PID:3100
                                  • C:\Windows\SYSTEM32\cmd.exe
                                    "cmd.exe" /C dir /b C:\"Program Files (x86)"\"uvnc bvba"\UltraVNC | find "winvnc"
                                    2⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:4104
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /S /D /c" dir /b C:\"Program Files (x86)"\"uvnc bvba"\UltraVNC "
                                      3⤵
                                        PID:2924
                                      • C:\Windows\system32\find.exe
                                        find "winvnc"
                                        3⤵
                                          PID:3584
                                      • C:\Windows\SYSTEM32\cmd.exe
                                        "cmd.exe" /C dir /b C:\"Program Files"\"uvnc bvba"\UltraVNC | find "winvnc"
                                        2⤵
                                        • Suspicious use of WriteProcessMemory
                                        PID:3896
                                        • C:\Windows\system32\find.exe
                                          find "winvnc"
                                          3⤵
                                            PID:2912
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /S /D /c" dir /b C:\"Program Files"\"uvnc bvba"\UltraVNC "
                                            3⤵
                                              PID:1940
                                          • C:\Windows\SYSTEM32\cmd.exe
                                            "cmd.exe" /C dir /b C:\"Program Files (x86)"\Websense\"Websense Endpoint" | find "F1EUI"
                                            2⤵
                                            • Suspicious use of WriteProcessMemory
                                            PID:1716
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /S /D /c" dir /b C:\"Program Files (x86)"\Websense\"Websense Endpoint" "
                                              3⤵
                                                PID:1256
                                              • C:\Windows\system32\find.exe
                                                find "F1EUI"
                                                3⤵
                                                  PID:4952
                                              • C:\Windows\SYSTEM32\cmd.exe
                                                "cmd.exe" /C dir /b C:\"Program Files"\Websense\"Websense Endpoint" | find "F1EUI"
                                                2⤵
                                                  PID:4224
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /S /D /c" dir /b C:\"Program Files"\Websense\"Websense Endpoint" "
                                                    3⤵
                                                      PID:4476
                                                    • C:\Windows\system32\find.exe
                                                      find "F1EUI"
                                                      3⤵
                                                        PID:4040
                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                      "cmd.exe" /C dir /b C:\"Program Files (x86)"\CrowdStrike | find "CSFalconService.exe"
                                                      2⤵
                                                        PID:392
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /S /D /c" dir /b C:\"Program Files (x86)"\CrowdStrike "
                                                          3⤵
                                                            PID:4760
                                                          • C:\Windows\system32\find.exe
                                                            find "CSFalconService.exe"
                                                            3⤵
                                                              PID:1060
                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                            "cmd.exe" /C dir /b C:\"Program Files"\CrowdStrike | find "CSFalconService.exe"
                                                            2⤵
                                                              PID:1008
                                                              • C:\Windows\system32\find.exe
                                                                find "CSFalconService.exe"
                                                                3⤵
                                                                  PID:1972
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /S /D /c" dir /b C:\"Program Files"\CrowdStrike "
                                                                  3⤵
                                                                    PID:3112

                                                              Network

                                                              MITRE ATT&CK Matrix

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • memory/5112-0-0x00000000009B0000-0x0000000000AB2000-memory.dmp

                                                                Filesize

                                                                1.0MB

                                                              • memory/5112-1-0x00007FFE42AC0000-0x00007FFE43581000-memory.dmp

                                                                Filesize

                                                                10.8MB

                                                              • memory/5112-2-0x000000001B800000-0x000000001B810000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/5112-3-0x000000001B800000-0x000000001B810000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/5112-4-0x000000001B800000-0x000000001B810000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/5112-5-0x00007FFE42AC0000-0x00007FFE43581000-memory.dmp

                                                                Filesize

                                                                10.8MB

                                                              • memory/5112-6-0x000000001B800000-0x000000001B810000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/5112-7-0x000000001B800000-0x000000001B810000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/5112-8-0x000000001B800000-0x000000001B810000-memory.dmp

                                                                Filesize

                                                                64KB