Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    05/11/2023, 04:54

General

  • Target

    NEAS.84293006a6338d5a54efc92975f488f0_JC.exe

  • Size

    23KB

  • MD5

    84293006a6338d5a54efc92975f488f0

  • SHA1

    79d485aba715ea282183065ffd04307ad91a112c

  • SHA256

    50709b8f592b36e66c402991278ae9949bed8cc8344b61d2eeec034b192d78fa

  • SHA512

    92edb6c469597fc44f044d0695c56c99a0181b2d71cb93adffcfa3c4a9179195ed44e6d3c2334cccc627a6d8b4035f1aefd2c5640b238ae683e6a0c856b8028b

  • SSDEEP

    384:W6CpSYp0ai1jf4eVFra8w1oOBkYgRIPZtN8nIFyBL:W67xaGjAer2kYOwD2IYd

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.84293006a6338d5a54efc92975f488f0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.84293006a6338d5a54efc92975f488f0_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Users\Admin\AppData\Local\Temp\ffengh.exe
      "C:\Users\Admin\AppData\Local\Temp\ffengh.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2944

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          95a443cf19ef52aab80e19fe61ae5cda

          SHA1

          42c337acd68ca404df5b3425e5e1e35f18ced825

          SHA256

          058f8b4d555f578147e86829c9f5eee4b35fc2c56a0e5e2d53877c3d08139df6

          SHA512

          2beb17db54404cee2205615bda5d51aa424d71a03faaee56c3fdee3e7771204a297523eaca57768221a3e6a124b4f85a622c930475272ae6e85bea843c956720

        • C:\Users\Admin\AppData\Local\Temp\Cab5063.tmp

          Filesize

          61KB

          MD5

          f3441b8572aae8801c04f3060b550443

          SHA1

          4ef0a35436125d6821831ef36c28ffaf196cda15

          SHA256

          6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

          SHA512

          5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

        • C:\Users\Admin\AppData\Local\Temp\Tar5102.tmp

          Filesize

          163KB

          MD5

          9441737383d21192400eca82fda910ec

          SHA1

          725e0d606a4fc9ba44aa8ffde65bed15e65367e4

          SHA256

          bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

          SHA512

          7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

        • C:\Users\Admin\AppData\Local\Temp\ffengh.exe

          Filesize

          23KB

          MD5

          58d7167a4fb405a90d3a6525954d5de7

          SHA1

          d6f34a885a00c77773d866b82b0ae3aa5d1d9199

          SHA256

          519ff9e4b0f1074ff30baad2765a4e1b3cbaad415c3224b3665c74d6be74c809

          SHA512

          e6e896789eb614c9d40280e99c8433a568b7d3c05df212feb3755423fc7fdb3447ebe9a6398d4fca880332ed0df80e52713ed948cdf0920ff5b950dacd6fe938

        • C:\Users\Admin\AppData\Local\Temp\ffengh.exe

          Filesize

          23KB

          MD5

          58d7167a4fb405a90d3a6525954d5de7

          SHA1

          d6f34a885a00c77773d866b82b0ae3aa5d1d9199

          SHA256

          519ff9e4b0f1074ff30baad2765a4e1b3cbaad415c3224b3665c74d6be74c809

          SHA512

          e6e896789eb614c9d40280e99c8433a568b7d3c05df212feb3755423fc7fdb3447ebe9a6398d4fca880332ed0df80e52713ed948cdf0920ff5b950dacd6fe938

        • C:\Users\Admin\AppData\Local\Temp\ffengh.exe

          Filesize

          23KB

          MD5

          58d7167a4fb405a90d3a6525954d5de7

          SHA1

          d6f34a885a00c77773d866b82b0ae3aa5d1d9199

          SHA256

          519ff9e4b0f1074ff30baad2765a4e1b3cbaad415c3224b3665c74d6be74c809

          SHA512

          e6e896789eb614c9d40280e99c8433a568b7d3c05df212feb3755423fc7fdb3447ebe9a6398d4fca880332ed0df80e52713ed948cdf0920ff5b950dacd6fe938

        • \Users\Admin\AppData\Local\Temp\ffengh.exe

          Filesize

          23KB

          MD5

          58d7167a4fb405a90d3a6525954d5de7

          SHA1

          d6f34a885a00c77773d866b82b0ae3aa5d1d9199

          SHA256

          519ff9e4b0f1074ff30baad2765a4e1b3cbaad415c3224b3665c74d6be74c809

          SHA512

          e6e896789eb614c9d40280e99c8433a568b7d3c05df212feb3755423fc7fdb3447ebe9a6398d4fca880332ed0df80e52713ed948cdf0920ff5b950dacd6fe938

        • \Users\Admin\AppData\Local\Temp\ffengh.exe

          Filesize

          23KB

          MD5

          58d7167a4fb405a90d3a6525954d5de7

          SHA1

          d6f34a885a00c77773d866b82b0ae3aa5d1d9199

          SHA256

          519ff9e4b0f1074ff30baad2765a4e1b3cbaad415c3224b3665c74d6be74c809

          SHA512

          e6e896789eb614c9d40280e99c8433a568b7d3c05df212feb3755423fc7fdb3447ebe9a6398d4fca880332ed0df80e52713ed948cdf0920ff5b950dacd6fe938

        • memory/3068-0-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/3068-9-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/3068-12-0x00000000003E0000-0x00000000003E6000-memory.dmp

          Filesize

          24KB

        • memory/3068-105-0x00000000003E0000-0x00000000003E6000-memory.dmp

          Filesize

          24KB