Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    05/11/2023, 15:26

General

  • Target

    NEAS.c701a0528aa526b3550235ba611c4d20_JC.exe

  • Size

    29KB

  • MD5

    c701a0528aa526b3550235ba611c4d20

  • SHA1

    507d5046a705ce2eb7218be9c147455d55133875

  • SHA256

    1fc3706381f818600ad09f037539ede98febe1bfeefce1caa21ff1d1755bed0d

  • SHA512

    42a8e63441ef9d7cef1e6ae8c2d0da020e265c9be95d4d397535c20dcc4504faa0440a3b6b212d8884cdbc6c02d3f7761d2320e1c285e577292f607ce4218245

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/h:AEwVs+0jNDY1qi/qp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 29 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.c701a0528aa526b3550235ba611c4d20_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.c701a0528aa526b3550235ba611c4d20_JC.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8f5c84df8c2147ab74ed037405f3b253

    SHA1

    af17beaafdbca523c8851d3cb4c71ff7d3ae9415

    SHA256

    038c41531bde45f5676b43c4b922707db82d8d8b12a59ff5d52ede791697aaeb

    SHA512

    21a4e678bbd9c3613a09b854e3a0d8844356a87b76fb3ee4ebc6afcc991172ff578bc9c0310a34fc68be353eafe85ba74318163fe90a5ace7d99bec98cc50dac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f2ff489553ec1ac2ea972441b775044a

    SHA1

    9fe9c08d3b33d82f50209e9d1240ec14894b7219

    SHA256

    6b2ecd2221bb492825cdbf016776a4521938376f534772be0944835c55d9181a

    SHA512

    3f61fcdbd1e3d1bb049bfc48f350d7509347a93d0dabc60f8644d9fda8873bdc5b506a87d9996c8b9a984e48b781a93d0d049acffefc44dc5f8d715f863dd565

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fdbf975e523337bb57d527aba703fb29

    SHA1

    0ddcb43b1015335a2eecf1bfd87229beda39c181

    SHA256

    a58a0630e03c7ab575e7e22b9929bbd61a27a45e6583c4916241c2d349b6b876

    SHA512

    e8b93bb22a081efd991264f31290282d6dedf9c40bdc276b8ba43bc46cb19de11198ddd84cb98be7bb530b28cd9ec24191b125f1a3e6f352d7fd5deb7a6dd5b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5a5adc859bd73e0e25f51f918652cf4b

    SHA1

    18074a8e7b38c6b6803c3fe7ca48c63b29f188cf

    SHA256

    fca6a9aef4d102ec1db22042f0bce835968c866aaa19c35fc02bffef25a61e09

    SHA512

    4044fdc56401f0b526dba136c900bab1f550b3d4cee9b0c23d979d613c61646842bb8e8b9ba0d6cf0cacdb9c05256872cf980b31b7541b02ef39ca66e4957068

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    acb21b7e8e6854f7688c1fe5bc4d9c2f

    SHA1

    cb0cf05a9746de5d71f3dc8a69ae9c161ff9c2b7

    SHA256

    9a686aba20d2ed2831d57cf30c17c8d1b3b2121c656e8c5a9266e11bb8f5a7fa

    SHA512

    e08771c11ce9a653f0d307f74c8ee9e6436f15946b87087ff69f8c823f26506f387b7149f83edf9516193e936dd53208f3bd6ee55d5536c4027664a3c5675ccd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    679cc61336e426383ccd004aca6989b2

    SHA1

    4a5b91306242edfaada13763385507182355c435

    SHA256

    52c3e420ec79b0b272f96afc4336afe7a421b76ccd96e5668a33d659c1068ad9

    SHA512

    cfc6df311915c78dedbae8d7a30f10421d70e3ffcaa97101bb8c96ca8620115bac9fbd6f7945a708eef47009cc13b7995349c6dc5257873c36a8a83ea9430ec4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    acbd4c4a6718b7c627dea49c11748dc2

    SHA1

    236a933ab05fa46cf95f545c9f5916dbd6e63dcc

    SHA256

    380c79055afe39ece2204c5696632a66d489582c3820ea6aec12567b8c66b9f3

    SHA512

    dd30d74b02769b38b9d9be0b371c230853fd46eb9ea723c4f3a4d7fabb53700e51995f9986c8220582b9078323e0daa1c108e83993f3e2994ec1c515a935b41e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b9c2ea91011f8f6c0d5737c82b4f39e6

    SHA1

    039acfcd4ae1607b1a32b5266ffeaae1e724160c

    SHA256

    62ab85c79a6fe2c9caee84224222a0d852d13462593eb4f5044860f33a0f70af

    SHA512

    3a79e3bbe9dcb7be90e7e7a2ab9191c650fa261884258eaf9f80225408a96d0eb5632f1a09ccb10a047dabff68e0d116a6da5f0911e946e06159c317a87443f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    586dd2441ff365d53fb6565d89ce2748

    SHA1

    53909e663a9162dfa2c06b5b5ba2668dbc4ce0fe

    SHA256

    559a4abe831056f8cb010f089e631b4437ed75e93f8d0e8efda3ac9e0445ee74

    SHA512

    c1fb4318d0c43c2e4e49810cf95375c0a9c013643547ae57ab40c1a3cab7bd346db161178012fab4928b568a71561c15859c11fbbcab2bfb8427d265af886a9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    985fd2fa0fdb62f0464b21688747612f

    SHA1

    f92bb8e6cf960f6d0607a83da6ea8de57b114cc1

    SHA256

    451a98c567948c55b58bd59e51d838b897c702bb660be6e455d70ac76edbed9a

    SHA512

    26916353055ff4144af34d5193c539ed3fcc3b4e663630bc66cf8719e5bd010d65d2ad6f3b62dd0f78e0b5b67976abfab7550e1a2edf088150614d37694e1d75

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H57AUUE9\default[1].htm

    Filesize

    302B

    MD5

    485828cfdc2c1efc0c51ff9b74dd34f8

    SHA1

    6f685134b031e9b2fff0eb8c7212c99bfba3719f

    SHA256

    615a15f6247f8f979b3a066801c98489018b1d137fd5d9b7bce73824acc70f06

    SHA512

    69736b9700c2f47feab282d8bf8bd6f02c9f62ecb9c02466b6cf76b1cd4b1becc70803123e73427c871c2aeb2eb64540edf95a342f78d9211ac0571e8fd1f426

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HYJJYCDH\default[1].htm

    Filesize

    302B

    MD5

    51b86971925c7d24d895ff89fdebc8f5

    SHA1

    d037148e50a77f0de8421e0ef81f87f9f73570da

    SHA256

    3b50a39db6499f5cb2d3b6cec01daa5c33fcf80c0722707c6014e23ed1577280

    SHA512

    1bc88174ee963971ca43e106828d9e74473cf1aa664f6d4fa43ec9631610ab4c1dc9a0c84f5c89dd2b627eaf64f57dee99eca84b88eb14c36bf7285cb9d7f0c4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HYJJYCDH\default[3].htm

    Filesize

    303B

    MD5

    0a53779b07f9c9c56ef169499851915e

    SHA1

    281bf81610dae812be159f95a0858f88f9b96637

    SHA256

    b946117d346ecf850135aae1ac65b368f4effd806bf5180ecd3c585f1324dbd1

    SHA512

    5a5016dcdeef68be7115eafee0a6844e3cc868fa04f353980d924fca7394962d919d8dece40b15b7ddcc867f956fc8c0e522b68688ca409f1671c39e42973dc6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HYJJYCDH\default[5].htm

    Filesize

    305B

    MD5

    2c4ce699b73ce3278646321d836aca40

    SHA1

    72ead77fbd91cfadae8914cbb4c023a618bf0bd1

    SHA256

    e7391b33aeb3be8afbe1b180430c606c5d3368baf7f458254cef5db9eef966e3

    SHA512

    89ec604cd4a4ad37c5392da0bb28bd9072d731a3efdd38707eeb7b1caf7626e6917da687529bf9426d8eb89fab23175399032d545d96ab93ffd19dd54c02c075

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HYJJYCDH\default[5].htm

    Filesize

    315B

    MD5

    14b82aec966e8e370a28053db081f4e9

    SHA1

    a0f30ebbdb4c69947d3bd41fa63ec4929dddd649

    SHA256

    202eada95ef503b303a05caf5a666f538236c7e697f5301fd178d994fa6e24cf

    SHA512

    ec04f1d86137dc4d75a47ba47bb2f2c912115372fa000cf986d13a04121aae9974011aa716c7da3893114e0d5d0e2fb680a6c2fd40a1f93f0e0bfd6fd625dfa7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OE1L9TUT\default[6].htm

    Filesize

    304B

    MD5

    605de1f61d0446f81e63c25750e99301

    SHA1

    0eaf9121f9dc1338807a511f92ea0b30dc2982a5

    SHA256

    049f75dee036da00f8c8366d29ee14268239df75b8be53aa104aec22b84560f0

    SHA512

    a6a2505b8b89a895922ad6dc06d2ce620cb51cc6582c1b7e498a9f1ee1e4e47c53ebc4f92f8aa37532d558667225e30574732c9fe7187153a262c933893e4285

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q3NPL6GJ\default[2].htm

    Filesize

    304B

    MD5

    4d1a10f22e8332513741877c47ac8970

    SHA1

    f68ecc13b7a71e948c6d137be985138586deb726

    SHA256

    a0dbc1b7d129cfa07a5d324fb03e41717fbdd17be3903e7e3fd7f21878dfbba4

    SHA512

    4f1e447c41f5b694bf2bff7f21a73f2bce00dfc844d3c7722ade44249d5ac4b50cf0319630b7f3fdb890bbd76528b6d0ed6b5ad98867d09cd90dcfbfd8b96860

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q3NPL6GJ\search[1].htm

    Filesize

    25B

    MD5

    8ba61a16b71609a08bfa35bc213fce49

    SHA1

    8374dddcc6b2ede14b0ea00a5870a11b57ced33f

    SHA256

    6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

    SHA512

    5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

  • C:\Users\Admin\AppData\Local\Temp\Cab8954.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar89D4.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Local\Temp\eQgCblzda.log

    Filesize

    256B

    MD5

    db57219ef93cdc0c7798a1ad3e4b75b4

    SHA1

    14d228f147d65bb77f96381b38f3663f2978d88b

    SHA256

    56ad758aa5d8ff4cb22a141f6a19f47983281192f22eea75f282ee00b7379050

    SHA512

    a9f883b5513f477c80ee32fd96c30d7c0c3101082309b52126cccb912c90f8fb6f0c6f8c28112da193cafcc4fc48dff0929ffd168394c0c98355e01a22b23afd

  • C:\Users\Admin\AppData\Local\Temp\tmp8150.tmp

    Filesize

    29KB

    MD5

    96220c19d0f0da331fe2a201d9cc4fae

    SHA1

    4dbb86a4b0fbeca293560fa1ea16c3256b19ecf1

    SHA256

    3e8dc5e215072fc0577d53369b0abd4a69e920be3c373208de6b6d2dfd2e1d54

    SHA512

    6db1fffdcae8815670f10d5e1d596eb625707462a641236cbbcbaaf71c2d0a63e4ac89d6a4dff0add42741979f7329d8cd583362ca1e8e0a6d502bbd614c914e

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    288B

    MD5

    d6eecb3d0f2bddde235a5862708932f9

    SHA1

    6856b844e8cd3f7bcc23b1623eb8bb4c075d0f60

    SHA256

    2a793a2a52d4b1aacfeeeef6d427539ec0e0386ca4e0798ba71841e43b6b7733

    SHA512

    bb41f697d97ff8bbc8856aad0a08338a392db3f41caba21229049f1779636ea9358e2125e66f90b0f8799e78acdf646b26f7e20519ad6dd7dd89ea105a8c5048

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    288B

    MD5

    ff8b3ebc972b1bb1c06a35002900ebef

    SHA1

    b6b1091dff74bf9a0369fbf1b519e871a4e4c709

    SHA256

    2bcbc43906c752d23fb31f081581524e1043cc6673bab3f5960edac8ccf443a4

    SHA512

    f83cde5f1bd77f2f8dc1ece3412d96f2c904a82266199c4f35373e2e8afcc0b52c7bf1dad0bcd6a884b552b705ed52724e776176f131fed038abd4c292e7f6ee

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/1324-4-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1324-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1324-741-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1324-2166-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1324-16-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1324-2057-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1324-1944-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1324-1249-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1324-2383-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1324-252-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2236-1250-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2236-18-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2236-19-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2236-24-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2236-29-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2236-10-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2236-31-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2236-1945-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2236-36-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2236-2058-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2236-41-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2236-742-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2236-2167-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2236-43-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2236-253-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2236-2384-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB