Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
05/11/2023, 02:21
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe
-
Size
178KB
-
MD5
a1d1236f11c6a62c4faff280bc84ddd0
-
SHA1
fc71a8327a91de579ae21ac6442fbb1c8caafbcb
-
SHA256
b9a9b6f6cad2cc71eb18f7a4f6da3c9c30caf0833c8b376f1e93f0d9be2400ae
-
SHA512
1687cc9c7aa24040ec71fa1f210e72a015f4c4c043abd1ac4a9e768e90f868a00fa017e813b8d23f80652fd09b2d5af10cf9eab42f221f1a4bd012cf83e1e3ea
-
SSDEEP
3072:M/047M+14BEHzWqgUfPNrXuSKp18z2Odknu+vmmWBuxBl11cRQycLRbpgjDD2UK:SwhBEHzWpUfPNr+DRD5fWBuxBl11tbpm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2960 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2848 forfskey.exe 2688 ~4F77.tmp 2716 sdiadctr.exe -
Loads dropped DLL 3 IoCs
pid Process 2252 NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe 2252 NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe 2848 forfskey.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Run\dxdistsc = "C:\\Users\\Admin\\AppData\\Roaming\\cttufWrp\\forfskey.exe" NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sdiadctr.exe NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2848 forfskey.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE 2716 sdiadctr.exe 1248 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1248 Explorer.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2848 2252 NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe 28 PID 2252 wrote to memory of 2848 2252 NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe 28 PID 2252 wrote to memory of 2848 2252 NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe 28 PID 2252 wrote to memory of 2848 2252 NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe 28 PID 2848 wrote to memory of 2688 2848 forfskey.exe 29 PID 2848 wrote to memory of 2688 2848 forfskey.exe 29 PID 2848 wrote to memory of 2688 2848 forfskey.exe 29 PID 2848 wrote to memory of 2688 2848 forfskey.exe 29 PID 2688 wrote to memory of 1248 2688 ~4F77.tmp 16 PID 2252 wrote to memory of 2960 2252 NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe 31 PID 2252 wrote to memory of 2960 2252 NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe 31 PID 2252 wrote to memory of 2960 2252 NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe 31 PID 2252 wrote to memory of 2960 2252 NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe 31 PID 2960 wrote to memory of 2732 2960 cmd.exe 33 PID 2960 wrote to memory of 2732 2960 cmd.exe 33 PID 2960 wrote to memory of 2732 2960 cmd.exe 33 PID 2960 wrote to memory of 2732 2960 cmd.exe 33 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2732 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Roaming\cttufWrp\forfskey.exe"C:\Users\Admin\AppData\Roaming\cttufWrp\forfskey.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\~4F77.tmp"C:\Users\Admin\AppData\Local\Temp\~4F77.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688
-
-
-
C:\Windows\SysWOW64\cmd.exe/C 259412299.cmd3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe"4⤵
- Views/modifies file attributes
PID:2732
-
-
-
-
C:\Windows\SysWOW64\sdiadctr.exeC:\Windows\SysWOW64\sdiadctr.exe -k1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219B
MD56847aa2fab4e4c10baf6cacbf6c86445
SHA1b9fb7e2c21698efd8c9363af5b052196b13ad5aa
SHA256699d25295aec01008b183b216f7d4353640b1b605a6b2f407fb98f17fd008a5c
SHA51281a8336f9a78767a3899479ce1f49f8efb4c064a53eff283b685e1383cb43440bff94bd4fdcb87359c610004009b20cae2d75154768744cf0944f8ee1be3a464
-
Filesize
6KB
MD573274db14be8da5a43e41541352959fb
SHA13c3be1e96df95e269aeb89178815e6442ef631da
SHA256d7718034a89128e44b6ba6e73e24a765560016982c10284b50b1f9aec51cbff4
SHA512993cb99f95d18a6ca7d86e96b1844003484a2aff970e964cccefeb3f48fbe448875b83c4dc82a2e8db8621ab97dcf2b485c648304e194e82e8f622a1ede9bd78
-
Filesize
178KB
MD5c60209ded555d9866bbd864af73574d1
SHA122e03f9b8f3091301266eaa4834c97479d3d67a7
SHA256737f4def29045dde8b5087734b9f120fd56a83b03f832c95680aeefe3f69fb76
SHA512be5b445cb55a950631eeeec74823ffbd2cb57080bae6f6893ee59d228be17c1d939b738adf257f9d6ec5548eb182d07369edf62c574edc24314dc00baa3a46db
-
Filesize
178KB
MD5c60209ded555d9866bbd864af73574d1
SHA122e03f9b8f3091301266eaa4834c97479d3d67a7
SHA256737f4def29045dde8b5087734b9f120fd56a83b03f832c95680aeefe3f69fb76
SHA512be5b445cb55a950631eeeec74823ffbd2cb57080bae6f6893ee59d228be17c1d939b738adf257f9d6ec5548eb182d07369edf62c574edc24314dc00baa3a46db
-
Filesize
178KB
MD5c60209ded555d9866bbd864af73574d1
SHA122e03f9b8f3091301266eaa4834c97479d3d67a7
SHA256737f4def29045dde8b5087734b9f120fd56a83b03f832c95680aeefe3f69fb76
SHA512be5b445cb55a950631eeeec74823ffbd2cb57080bae6f6893ee59d228be17c1d939b738adf257f9d6ec5548eb182d07369edf62c574edc24314dc00baa3a46db
-
Filesize
178KB
MD5a1d1236f11c6a62c4faff280bc84ddd0
SHA1fc71a8327a91de579ae21ac6442fbb1c8caafbcb
SHA256b9a9b6f6cad2cc71eb18f7a4f6da3c9c30caf0833c8b376f1e93f0d9be2400ae
SHA5121687cc9c7aa24040ec71fa1f210e72a015f4c4c043abd1ac4a9e768e90f868a00fa017e813b8d23f80652fd09b2d5af10cf9eab42f221f1a4bd012cf83e1e3ea
-
Filesize
178KB
MD5a1d1236f11c6a62c4faff280bc84ddd0
SHA1fc71a8327a91de579ae21ac6442fbb1c8caafbcb
SHA256b9a9b6f6cad2cc71eb18f7a4f6da3c9c30caf0833c8b376f1e93f0d9be2400ae
SHA5121687cc9c7aa24040ec71fa1f210e72a015f4c4c043abd1ac4a9e768e90f868a00fa017e813b8d23f80652fd09b2d5af10cf9eab42f221f1a4bd012cf83e1e3ea
-
Filesize
6KB
MD573274db14be8da5a43e41541352959fb
SHA13c3be1e96df95e269aeb89178815e6442ef631da
SHA256d7718034a89128e44b6ba6e73e24a765560016982c10284b50b1f9aec51cbff4
SHA512993cb99f95d18a6ca7d86e96b1844003484a2aff970e964cccefeb3f48fbe448875b83c4dc82a2e8db8621ab97dcf2b485c648304e194e82e8f622a1ede9bd78
-
Filesize
178KB
MD5c60209ded555d9866bbd864af73574d1
SHA122e03f9b8f3091301266eaa4834c97479d3d67a7
SHA256737f4def29045dde8b5087734b9f120fd56a83b03f832c95680aeefe3f69fb76
SHA512be5b445cb55a950631eeeec74823ffbd2cb57080bae6f6893ee59d228be17c1d939b738adf257f9d6ec5548eb182d07369edf62c574edc24314dc00baa3a46db
-
Filesize
178KB
MD5c60209ded555d9866bbd864af73574d1
SHA122e03f9b8f3091301266eaa4834c97479d3d67a7
SHA256737f4def29045dde8b5087734b9f120fd56a83b03f832c95680aeefe3f69fb76
SHA512be5b445cb55a950631eeeec74823ffbd2cb57080bae6f6893ee59d228be17c1d939b738adf257f9d6ec5548eb182d07369edf62c574edc24314dc00baa3a46db