Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
05/11/2023, 04:33
Behavioral task
behavioral1
Sample
NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe
-
Size
62KB
-
MD5
fe2e297b5137866e0731f799c0e5f070
-
SHA1
600a110904d2093e3151b8150b442e9fa7199a5a
-
SHA256
cf7a08e3c2b9e5e7508d39dc2e978b0f59b9e60842f480ef9e2fa637b65d52d0
-
SHA512
23d3b2aca2c864b7157a15dc7c9385cac0176c55f037016d871be8f5c4754587faaab3f6c3b6b8c7ecf2718d6b02f9a61293dfb56dedd490a0ea2c94b9ef5ed1
-
SSDEEP
1536:y4QQ6NSyM61l19piO+LV8YEoI/EU9RUe4mCaY7+Knx:y4X6NSyfnpijeYEoIcq4wk+Knx
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1552-0-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/files/0x0007000000016d64-6.dat upx behavioral1/memory/1552-28-0x0000000000400000-0x0000000000464000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winxcfg.exe = "C:\\Windows\\system32\\winxcfg.exe" NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe -
Drops file in System32 directory 27 IoCs
description ioc Process File created C:\Windows\SysWOW64\macromd\illegal porno - 15 year old raped by two men on boat.mpg.pif NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\macromd\play station emulator crack.exe NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\macromd\16 year old on beach.exe NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\macromd\GTA 3 Crack.exe NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\macromd\preteen sucking huge cock illegal.mpg.exe NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\macromd\Want to see a massive horse cock in a tight little teen's pussy.mpg.pif NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\macromd\AIM Flooder.exe NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\macromd\cute girl giving head.exe NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\macromd\teen tied up and raped.exe NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\macromd\password stealer.exe NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\macromd\Universal Game Crack.exe NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\macromd\divx pro.exe NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\macromd\girls gone wild.mpg.exe NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\macromd\hot girl on the beach sucking cock and fucking guy.mpg.exe NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\macromd\OfficeXP Keygen.exe NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\macromd\icqcracker.exe NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\macromd\AIM Account Stealer.exe NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\macromd\Bondage Fetish Foot Cum.exe NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\macromd\invisible IP.exe NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\winxcfg.exe NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\macromd\Another bang bus victim forced rape sex cum.mpg.exe NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\macromd\preteen snuff sex rape with a stick hardcore.mpg.pif NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\macromd\aimcracker.exe NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\macromd\Hotmail Hacker.exe NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\macromd\pamela anderson naked.mpg.exe NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\macromd\Digimon.exe NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe File created C:\Windows\SysWOW64\macromd\aol password cracker.exe NEAS.fe2e297b5137866e0731f799c0e5f070_JC.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5be0afab2ea8ec0d36c1cd83673e35f3f
SHA18e72690596349d60fce81afc648816f7d8976425
SHA256102f6860add30c15f3bf50c4e6a839351a370641a7db7fc5c0f1f0e2c51f4006
SHA512ea26926020f296d281db483ef3a4d7f9fe01320c53138c11624daef18dfaf434ca01f5115963c7ec1f567a0be0d03f6047e3b45838d633ad906248d2d4bf471e