Analysis

  • max time kernel
    157s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/11/2023, 19:15

General

  • Target

    NEAS.753c7fd0ba0f76c3b6e274b758793220_JC.exe

  • Size

    1.5MB

  • MD5

    753c7fd0ba0f76c3b6e274b758793220

  • SHA1

    7f517a3c6a039f8773aa29cf3aa8527c9e0e3eb6

  • SHA256

    3493264693811ad58a06b7fc211114b3fdd5799dba9cc8979a0975bccfd1ccb3

  • SHA512

    b283485873a43c542acc419891c02f68c312eac70b163d5351592933ea45398a7ad529dfc953ea80c53b3d169cfeab22943dc129ff74f36daa81091962786655

  • SSDEEP

    24576:q7iiVkn5RQy0D8LioTSTqGOc4BJrqK/lGNrIQ7ZcYYrWBvO0yjm04HW:q7CIgBJJ/6EQ7ZcYYrwvof

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3204
      • C:\Users\Admin\AppData\Local\Temp\NEAS.753c7fd0ba0f76c3b6e274b758793220_JC.exe
        "C:\Users\Admin\AppData\Local\Temp\NEAS.753c7fd0ba0f76c3b6e274b758793220_JC.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4160
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a43AB.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4944
          • C:\Users\Admin\AppData\Local\Temp\NEAS.753c7fd0ba0f76c3b6e274b758793220_JC.exe
            "C:\Users\Admin\AppData\Local\Temp\NEAS.753c7fd0ba0f76c3b6e274b758793220_JC.exe"
            4⤵
            • Executes dropped EXE
            • Writes to the Master Boot Record (MBR)
            PID:2672
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4108
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4572
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:3912

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        484KB

        MD5

        c7fe0e66a9253408aeb5a6bc9c37fd5a

        SHA1

        33d6adfa0ff9ed9dc75d38294b2840ef555a98a2

        SHA256

        64a934607ae7f56617217ec9f21a592d1472593bba48f3264cfd6e36d76e431f

        SHA512

        6515110f638520ff38168a1765a370dffed9076e0c128777b2050d896994801e136588efacb5221db422e5fed9ea8c2429cbda2a3dab5f477e1e80725fcc638f

      • C:\Users\Admin\AppData\Local\Temp\$$a43AB.bat

        Filesize

        578B

        MD5

        a97c0149a6316405b0b5dc731d85eefa

        SHA1

        874da766b5bf2c0adb117a20b249e9b2ed2d0b86

        SHA256

        89bd4f40bc5ad4b5f02a6c303404570f5b1bc3cd26c954dbf0bc59db5f5501e2

        SHA512

        14c68d04e0d88c800226f886ede57548dec7845d962979836c1c357e9679ba9fb9aa2b7dd694e954048867ad2f859178f313537179b4c68e5933b6920b7a5a3f

      • C:\Users\Admin\AppData\Local\Temp\NEAS.753c7fd0ba0f76c3b6e274b758793220_JC.exe

        Filesize

        1.5MB

        MD5

        51534ec306e39f9687ca39902578f5d1

        SHA1

        76b09076f689a68e979f766239f3d84b24e7e4c8

        SHA256

        bfe375706279b86092147e0b19000962c56ca9c8e34f308a26a39f825c643ec3

        SHA512

        7c52f8e2b1b6eeb6e842759ee0187b2dce25544bbf5e7c3c33c404280d9f07f75150119cbf720dcd668d2978d18ddeddc475c166bcb647741b7f73269c90cfa1

      • C:\Users\Admin\AppData\Local\Temp\NEAS.753c7fd0ba0f76c3b6e274b758793220_JC.exe.exe

        Filesize

        1.5MB

        MD5

        51534ec306e39f9687ca39902578f5d1

        SHA1

        76b09076f689a68e979f766239f3d84b24e7e4c8

        SHA256

        bfe375706279b86092147e0b19000962c56ca9c8e34f308a26a39f825c643ec3

        SHA512

        7c52f8e2b1b6eeb6e842759ee0187b2dce25544bbf5e7c3c33c404280d9f07f75150119cbf720dcd668d2978d18ddeddc475c166bcb647741b7f73269c90cfa1

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        5de1896254bed3e2fa998b40d865d2fe

        SHA1

        6d888895d007e0f6f63c93a1e2e3b1a2b8c8b2a3

        SHA256

        4cd6bfa999fcbdfb3c9fe3986e6890649ea613058872fa6bf7f3433d4e0bcb6d

        SHA512

        3e2db69af11f558a669e363ace8ffb1a32663daa9a89e647c21e2908ab0de9d9afbed8fc966192c18e03d7f4180f70a6c3d9d2bb17df5955c1519ac6429d179a

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        5de1896254bed3e2fa998b40d865d2fe

        SHA1

        6d888895d007e0f6f63c93a1e2e3b1a2b8c8b2a3

        SHA256

        4cd6bfa999fcbdfb3c9fe3986e6890649ea613058872fa6bf7f3433d4e0bcb6d

        SHA512

        3e2db69af11f558a669e363ace8ffb1a32663daa9a89e647c21e2908ab0de9d9afbed8fc966192c18e03d7f4180f70a6c3d9d2bb17df5955c1519ac6429d179a

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        5de1896254bed3e2fa998b40d865d2fe

        SHA1

        6d888895d007e0f6f63c93a1e2e3b1a2b8c8b2a3

        SHA256

        4cd6bfa999fcbdfb3c9fe3986e6890649ea613058872fa6bf7f3433d4e0bcb6d

        SHA512

        3e2db69af11f558a669e363ace8ffb1a32663daa9a89e647c21e2908ab0de9d9afbed8fc966192c18e03d7f4180f70a6c3d9d2bb17df5955c1519ac6429d179a

      • F:\$RECYCLE.BIN\S-1-5-21-3125601242-331447593-1512828465-1000\_desktop.ini

        Filesize

        9B

        MD5

        6029ce528adbc1284163cdd2b27a082e

        SHA1

        a2f23e1d5101c3b6929686a2d5711c2af2dec1b7

        SHA256

        5036deecfbb090aa7f7c21c159b1921df0cf23eedafb7e0c208668ad82872dae

        SHA512

        a661e939e69a59f88fd86fa654371ba4b3e3e8faf5c1b39bdaa0def8b277b26b63e96d4f5eb047ca3d8888597165dc709f395eeaf333c25c9cf56441c31dd676

      • memory/4108-20-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4108-46-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4108-937-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4108-31-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4108-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4108-936-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4108-39-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4108-9-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4108-51-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4108-55-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4108-811-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4160-1-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4160-11-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4160-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB