Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2023 02:21
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe
-
Size
178KB
-
MD5
a1d1236f11c6a62c4faff280bc84ddd0
-
SHA1
fc71a8327a91de579ae21ac6442fbb1c8caafbcb
-
SHA256
b9a9b6f6cad2cc71eb18f7a4f6da3c9c30caf0833c8b376f1e93f0d9be2400ae
-
SHA512
1687cc9c7aa24040ec71fa1f210e72a015f4c4c043abd1ac4a9e768e90f868a00fa017e813b8d23f80652fd09b2d5af10cf9eab42f221f1a4bd012cf83e1e3ea
-
SSDEEP
3072:M/047M+14BEHzWqgUfPNrXuSKp18z2Odknu+vmmWBuxBl11cRQycLRbpgjDD2UK:SwhBEHzWpUfPNr+DRD5fWBuxBl11tbpm
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1668 bitsmmc.exe 1548 Picknced.exe 2268 ~8CFE.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\agenicli = "C:\\Users\\Admin\\AppData\\Roaming\\doskance\\bitsmmc.exe" NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Picknced.exe NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1668 bitsmmc.exe 1668 bitsmmc.exe 3324 Explorer.EXE 3324 Explorer.EXE 1548 Picknced.exe 1548 Picknced.exe 3324 Explorer.EXE 3324 Explorer.EXE 1548 Picknced.exe 1548 Picknced.exe 3324 Explorer.EXE 1548 Picknced.exe 3324 Explorer.EXE 1548 Picknced.exe 3324 Explorer.EXE 1548 Picknced.exe 1548 Picknced.exe 3324 Explorer.EXE 3324 Explorer.EXE 1548 Picknced.exe 3324 Explorer.EXE 1548 Picknced.exe 3324 Explorer.EXE 1548 Picknced.exe 3324 Explorer.EXE 1548 Picknced.exe 3324 Explorer.EXE 1548 Picknced.exe 1548 Picknced.exe 3324 Explorer.EXE 3324 Explorer.EXE 3324 Explorer.EXE 1548 Picknced.exe 1548 Picknced.exe 1548 Picknced.exe 3324 Explorer.EXE 1548 Picknced.exe 3324 Explorer.EXE 3324 Explorer.EXE 1548 Picknced.exe 3324 Explorer.EXE 1548 Picknced.exe 3324 Explorer.EXE 1548 Picknced.exe 1548 Picknced.exe 3324 Explorer.EXE 3324 Explorer.EXE 1548 Picknced.exe 1548 Picknced.exe 3324 Explorer.EXE 3324 Explorer.EXE 3324 Explorer.EXE 1548 Picknced.exe 1548 Picknced.exe 3324 Explorer.EXE 1548 Picknced.exe 3324 Explorer.EXE 1548 Picknced.exe 3324 Explorer.EXE 1548 Picknced.exe 1548 Picknced.exe 3324 Explorer.EXE 3324 Explorer.EXE 1548 Picknced.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3324 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3324 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3016 wrote to memory of 1668 3016 NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe 93 PID 3016 wrote to memory of 1668 3016 NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe 93 PID 3016 wrote to memory of 1668 3016 NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe 93 PID 1668 wrote to memory of 2268 1668 bitsmmc.exe 92 PID 1668 wrote to memory of 2268 1668 bitsmmc.exe 92 PID 2268 wrote to memory of 3324 2268 ~8CFE.tmp 37 PID 3016 wrote to memory of 3416 3016 NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe 96 PID 3016 wrote to memory of 3416 3016 NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe 96 PID 3016 wrote to memory of 3416 3016 NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe 96 PID 3416 wrote to memory of 2536 3416 cmd.exe 94 PID 3416 wrote to memory of 2536 3416 cmd.exe 94 PID 3416 wrote to memory of 2536 3416 cmd.exe 94 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2536 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Roaming\doskance\bitsmmc.exe"C:\Users\Admin\AppData\Roaming\doskance\bitsmmc.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1668
-
-
C:\Windows\SysWOW64\cmd.exe/C 240618812.cmd3⤵
- Suspicious use of WriteProcessMemory
PID:3416
-
-
-
C:\Windows\SysWOW64\Picknced.exeC:\Windows\SysWOW64\Picknced.exe -k1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1548
-
C:\Users\Admin\AppData\Local\Temp\~8CFE.tmp"C:\Users\Admin\AppData\Local\Temp\~8CFE.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2268
-
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "NEAS.a1d1236f11c6a62c4faff280bc84ddd0_JC.exe"1⤵
- Views/modifies file attributes
PID:2536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219B
MD55393cfaf369075d874b0c7ecaf6a2cc3
SHA19a12b6161035a83ccfa14c4dc46651fc2b55902b
SHA256a6b3480070827f8fdf48e9113e0d5f86b9db1f5dc51bb17708fa0d7b50aa0807
SHA51270191f54f2e03630d722a29a30630484755362b99efa813fec66b8313202167c53637f40823ff7d3e0f1fdda375357d33ebf3b707853c1591f47ac117f2bf300
-
Filesize
6KB
MD55a7a16802deed257fb4683e20432d26a
SHA1088b15b5bc8a1efbc5193faebc50c85ace29faf4
SHA256a16bfca1da1bf3b6f5dc994e929aa2b97e8a5fa8de6aa9ffa10296d09567df26
SHA512a525407f099500a1997986932821625aa927502777e61e51ad1b8fff6912f19d0c59995b388da0945268ed376f12bceade444489742250f12f48d30cbe019168
-
Filesize
6KB
MD55a7a16802deed257fb4683e20432d26a
SHA1088b15b5bc8a1efbc5193faebc50c85ace29faf4
SHA256a16bfca1da1bf3b6f5dc994e929aa2b97e8a5fa8de6aa9ffa10296d09567df26
SHA512a525407f099500a1997986932821625aa927502777e61e51ad1b8fff6912f19d0c59995b388da0945268ed376f12bceade444489742250f12f48d30cbe019168
-
Filesize
178KB
MD5ba0eebc80eba87e3c76b0daa0303b589
SHA1b3ddbada3daadbf8cdca91598639e0093b03a67f
SHA2567d8931881053cbf709c7716d235ae649fa9a3149e0beee4df1880b46e8bf6020
SHA5128f832b021c3cabfcc623c046513abb34e5d4a2d58325278974c03879100b19c9954a420fa2ea3c59b24e6d1c39950a8812377f2b4d75fd6f9a641eb2a0bd9a3a
-
Filesize
178KB
MD5ba0eebc80eba87e3c76b0daa0303b589
SHA1b3ddbada3daadbf8cdca91598639e0093b03a67f
SHA2567d8931881053cbf709c7716d235ae649fa9a3149e0beee4df1880b46e8bf6020
SHA5128f832b021c3cabfcc623c046513abb34e5d4a2d58325278974c03879100b19c9954a420fa2ea3c59b24e6d1c39950a8812377f2b4d75fd6f9a641eb2a0bd9a3a
-
Filesize
178KB
MD5a1d1236f11c6a62c4faff280bc84ddd0
SHA1fc71a8327a91de579ae21ac6442fbb1c8caafbcb
SHA256b9a9b6f6cad2cc71eb18f7a4f6da3c9c30caf0833c8b376f1e93f0d9be2400ae
SHA5121687cc9c7aa24040ec71fa1f210e72a015f4c4c043abd1ac4a9e768e90f868a00fa017e813b8d23f80652fd09b2d5af10cf9eab42f221f1a4bd012cf83e1e3ea
-
Filesize
178KB
MD5a1d1236f11c6a62c4faff280bc84ddd0
SHA1fc71a8327a91de579ae21ac6442fbb1c8caafbcb
SHA256b9a9b6f6cad2cc71eb18f7a4f6da3c9c30caf0833c8b376f1e93f0d9be2400ae
SHA5121687cc9c7aa24040ec71fa1f210e72a015f4c4c043abd1ac4a9e768e90f868a00fa017e813b8d23f80652fd09b2d5af10cf9eab42f221f1a4bd012cf83e1e3ea