Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
04/11/2023, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f262a3e7287400f91438f68cafec4130_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.f262a3e7287400f91438f68cafec4130_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.f262a3e7287400f91438f68cafec4130_JC.exe
-
Size
39KB
-
MD5
f262a3e7287400f91438f68cafec4130
-
SHA1
9b12e1c3a6eb27738871111488c7d12af66521f2
-
SHA256
20478de593a069d1d054c65c8b964f53c97dff0a39b5b8404533eea4b9c3e3d7
-
SHA512
4e60ebf395e368336058b989bcdbdd5f4e641a1955e0a40c411a1025e2e3997e432b282c619a8a1551a58a686d895b3f4c3884d9b57adbb11a1cd8a8470dd439
-
SSDEEP
384:SmWS77uip9dQRGwAck4q9+MZSHoCbWETM2LCmKbWETM2LCmKYHJE79cyPse7/OCY:RdQM4q9+rHLrMjrMcusX50
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2192 svchost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 icanhazip.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2040 set thread context of 2024 2040 NEAS.f262a3e7287400f91438f68cafec4130_JC.exe 28 -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2024 NEAS.f262a3e7287400f91438f68cafec4130_JC.exe 2024 NEAS.f262a3e7287400f91438f68cafec4130_JC.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2024 2040 NEAS.f262a3e7287400f91438f68cafec4130_JC.exe 28 PID 2040 wrote to memory of 2024 2040 NEAS.f262a3e7287400f91438f68cafec4130_JC.exe 28 PID 2040 wrote to memory of 2024 2040 NEAS.f262a3e7287400f91438f68cafec4130_JC.exe 28 PID 2040 wrote to memory of 2024 2040 NEAS.f262a3e7287400f91438f68cafec4130_JC.exe 28 PID 2040 wrote to memory of 2024 2040 NEAS.f262a3e7287400f91438f68cafec4130_JC.exe 28 PID 2040 wrote to memory of 2024 2040 NEAS.f262a3e7287400f91438f68cafec4130_JC.exe 28 PID 2040 wrote to memory of 2024 2040 NEAS.f262a3e7287400f91438f68cafec4130_JC.exe 28 PID 2040 wrote to memory of 2024 2040 NEAS.f262a3e7287400f91438f68cafec4130_JC.exe 28 PID 2024 wrote to memory of 2192 2024 NEAS.f262a3e7287400f91438f68cafec4130_JC.exe 29 PID 2024 wrote to memory of 2192 2024 NEAS.f262a3e7287400f91438f68cafec4130_JC.exe 29 PID 2024 wrote to memory of 2192 2024 NEAS.f262a3e7287400f91438f68cafec4130_JC.exe 29 PID 2024 wrote to memory of 2192 2024 NEAS.f262a3e7287400f91438f68cafec4130_JC.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f262a3e7287400f91438f68cafec4130_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f262a3e7287400f91438f68cafec4130_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\NEAS.f262a3e7287400f91438f68cafec4130_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f262a3e7287400f91438f68cafec4130_JC.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Deletes itself
PID:2192
-
-