Analysis

  • max time kernel
    130s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    05-11-2023 14:56

General

  • Target

    NEAS.53971dae4ce81a6606ab22f70cabf97e_JC.exe

  • Size

    1.6MB

  • MD5

    53971dae4ce81a6606ab22f70cabf97e

  • SHA1

    964970bb12c99891dab610107e01bde3c9af8a8f

  • SHA256

    9d684232d2abc402cf55814e90f46b2221b13f83a1c6e485a3fec726f75eea33

  • SHA512

    baad84ada0cb959fd865665ba64bc2c1982e5b0ff823b6a5f843e190fb04f206ea6e158d71639bacf97ffbdb02fc384abc1aa2401981878f52feb5d6764c729b

  • SSDEEP

    24576:hLILY8Xu/3y8UsG2BgYLicwnkOCHdebUKyZURQ1TgjTq:WYrC8UsGuTwDCHdeQKyZURQ1EjTq

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.53971dae4ce81a6606ab22f70cabf97e_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.53971dae4ce81a6606ab22f70cabf97e_JC.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde
      2⤵
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2031025043.tmp

    Filesize

    1.6MB

    MD5

    53971dae4ce81a6606ab22f70cabf97e

    SHA1

    964970bb12c99891dab610107e01bde3c9af8a8f

    SHA256

    9d684232d2abc402cf55814e90f46b2221b13f83a1c6e485a3fec726f75eea33

    SHA512

    baad84ada0cb959fd865665ba64bc2c1982e5b0ff823b6a5f843e190fb04f206ea6e158d71639bacf97ffbdb02fc384abc1aa2401981878f52feb5d6764c729b

  • C:\Users\Admin\AppData\Local\Temp\NEAS.53971dae4ce81a6606ab22f70cabf97e_JC.xlsx

    Filesize

    16KB

    MD5

    5822f4d6c7fb536faf8c1c8b7f1fa3e1

    SHA1

    46034884eccbcabc06bc70b67d7916e6e1afab01

    SHA256

    bb2ccbafa4535dd9e9c26bcdfeda114ab25eab3b6715765fb56fd6ee1386d4af

    SHA512

    b8545b5bb0d10b6745e587ccc63b51319180fac965cfe87ab747843d14490ad5131648e12ce2a28f6028a6f9420e353663ef9c4007bff666b08f32efc3f0b5d6

  • memory/2644-10-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2644-11-0x000000007223D000-0x0000000072248000-memory.dmp

    Filesize

    44KB

  • memory/2644-13-0x000000007223D000-0x0000000072248000-memory.dmp

    Filesize

    44KB

  • memory/2644-16-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2644-17-0x000000007223D000-0x0000000072248000-memory.dmp

    Filesize

    44KB