Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
05-11-2023 16:00
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.74687ec1de6d49e2dfd11d5c4f0c45a0_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.74687ec1de6d49e2dfd11d5c4f0c45a0_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.74687ec1de6d49e2dfd11d5c4f0c45a0_JC.exe
-
Size
217KB
-
MD5
74687ec1de6d49e2dfd11d5c4f0c45a0
-
SHA1
004f7135db1386be0ed6689dde4a5a8977fd213b
-
SHA256
f3913f342925a194afa64bbf41f7353dc2c735380163fad906f4bcb8d31b0d36
-
SHA512
7aa708ab661ea67f686e27aa2f8fdf045dbc76c3880f82d0ced8226bb9f4921612088d349b22e60996e77714f79eb8ee3ba16a49e558196e67aa15df5600cb9a
-
SSDEEP
6144:/rRaTyDOnlo7eM+mlkWgRXOqobzWjozm2ulYM6Y:DsTbzu1glovW4EH6Y
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2428 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 292 NEAS.74687ec1de6d49e2dfd11d5c4f0c45a0_JC.exe 292 NEAS.74687ec1de6d49e2dfd11d5c4f0c45a0_JC.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\94f6c7b9 = "M\x1f‰¨À;)Õ1¶h@ô‰\x02\x05vš„ÙöŒ\x1fæM™’ù™\tj”µimÝůF\x01\x14„÷T\x01÷m'%lÉM…\u008de\x01m\rFe\x05µ\x1e=$º2uÕÊ”\x01\u008f±Æ\u00adÔ–!ñ\fÜ\u009d•!M\"ÙD’•dù\f\x0e|äÜ\x1cÝQ’j]ý…\x05Ê¡ÅLrÁnš‰®‘\u00adïšý5ô\u008dµ\u008dá\x1aÊ\"]yÖMòÕÑo\u009dâgÅœ\x17\x04¬ô\r\u009dÏ„\u009dTüœ%æ,4b\x02Ç\x12D¦—MÔVß\f5^í\x1d'ý~\x1cM½ÉtíôV÷&âï¼Õ\x04ù”TŸ¢ñ…4âµåÔÏ\u008d\u0081̦g=\tíd\n\\š\u00adÑŒñ?§Ö媴O\x0f!-Â\x05ô!á¥%\x15†‘\tJ²L¥*\x1c*\x14¼î\x15Ia<F~" NEAS.74687ec1de6d49e2dfd11d5c4f0c45a0_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\94f6c7b9 = "M\x1f‰¨À;)Õ1¶h@ô‰\x02\x05vš„ÙöŒ\x1fæM™’ù™\tj”µimÝůF\x01\x14„÷T\x01÷m'%lÉM…\u008de\x01m\rFe\x05µ\x1e=$º2uÕÊ”\x01\u008f±Æ\u00adÔ–!ñ\fÜ\u009d•!M\"ÙD’•dù\f\x0e|äÜ\x1cÝQ’j]ý…\x05Ê¡ÅLrÁnš‰®‘\u00adïšý5ô\u008dµ\u008dá\x1aÊ\"]yÖMòÕÑo\u009dâgÅœ\x17\x04¬ô\r\u009dÏ„\u009dTüœ%æ,4b\x02Ç\x12D¦—MÔVß\f5^í\x1d'ý~\x1cM½ÉtíôV÷&âï¼Õ\x04ù”TŸ¢ñ…4âµåÔÏ\u008d\u0081̦g=\tíd\n\\š\u00adÑŒñ?§Ö媴O\x0f!-Â\x05ô!á¥%\x15†‘\tJ²L¥*\x1c*\x14¼î\x15Ia<F~" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe NEAS.74687ec1de6d49e2dfd11d5c4f0c45a0_JC.exe File opened for modification C:\Windows\apppatch\svchost.exe NEAS.74687ec1de6d49e2dfd11d5c4f0c45a0_JC.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 292 NEAS.74687ec1de6d49e2dfd11d5c4f0c45a0_JC.exe 292 NEAS.74687ec1de6d49e2dfd11d5c4f0c45a0_JC.exe 292 NEAS.74687ec1de6d49e2dfd11d5c4f0c45a0_JC.exe 292 NEAS.74687ec1de6d49e2dfd11d5c4f0c45a0_JC.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe 2428 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 292 NEAS.74687ec1de6d49e2dfd11d5c4f0c45a0_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 292 wrote to memory of 2428 292 NEAS.74687ec1de6d49e2dfd11d5c4f0c45a0_JC.exe 28 PID 292 wrote to memory of 2428 292 NEAS.74687ec1de6d49e2dfd11d5c4f0c45a0_JC.exe 28 PID 292 wrote to memory of 2428 292 NEAS.74687ec1de6d49e2dfd11d5c4f0c45a0_JC.exe 28 PID 292 wrote to memory of 2428 292 NEAS.74687ec1de6d49e2dfd11d5c4f0c45a0_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.74687ec1de6d49e2dfd11d5c4f0c45a0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.74687ec1de6d49e2dfd11d5c4f0c45a0_JC.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59837a2f79e9ec2a29f09486f8f645655
SHA1c6aae0bd9b93f20cddcc480a4e0a9a1314844570
SHA256875efc9710d828064a1ff8f9d247922de81454358b69a9d7c26b73cfee47747f
SHA5123b8b177eb16311f7cbd6bcc6d0d1b3d7ccd994450a6b3a0e3d8707a083bd142204ec46070466c9bd98ce4278dbfd16fd939561e37b409f663684550f2600ab03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b7e266273b4d376b01422932bd0f27f
SHA1d8edea53a4ce183ff93074e3584fd62982c96e2b
SHA2565c876be1bfdb3b046590778d6ca0b99400074c56d7d130eee083ee307000d9f3
SHA512e094205961351106e56db8201b0d4bb1b4303cae462d534d8cb7c06d1d9f6a30bbbd3e7c4910dcecb0b92ca62e1c2639a52b8c1eb2d839dc45435c91fca65bbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1a997ff67647f61d07a573d61d41e2f
SHA14018ebfac71b695385507b3839abaa8848884215
SHA256b42d3315a5ea931e15774edb1da17e81117d244138a84b0763208bc6b4be4e9b
SHA512570ebb6a83aaeff81d6abd5adbe4f6bf9f8f0b5009920e7e6e96f69bbd1978c2bd93c20582858dc9ef46d2776919b3756cc4abfdc7fcad79f51aeda108ad59d6
-
Filesize
2KB
MD5f993475a2a1c1b7e6d1c7e6c59e9186c
SHA17215bfe1a219ee34160e00a95123c84f87dd2289
SHA25669a187cef32a8cc036ac7a65d990a08371379cae6315d6b1464c37e6cbaaf5ac
SHA512b89a1c65d7174b436aaf8bf5b4a72cbeed72825eca5dbf00ec41c720d9bc31fd736f8715e309e6b5c5ef9511d7cc824109a8e46afbee3774d6528bbdb0ec447f
-
Filesize
1KB
MD5d4fa59e584d50ceeec181bdc9845a69d
SHA1748f9a8d4ab2e4f8cdea83191404dc6e5d760d93
SHA25605523677fcf09766cbd49bdcec5668aab996448e9bfd07a037259931665cfca0
SHA5120888b5ce95455e2e249afc014d3be295109252fd80a154275b0102a4df579a24f798117ce6f22bc004c99f43c90db7c092b4422348305e289ad0d00d04ae47a3
-
Filesize
2KB
MD5fb43170c863210e38d306278ca5c0643
SHA15eaa2a32eebdcc2825a6af6327cf0bfe1d307b0b
SHA256a8adaa79decf78d5a8f5d336ac283b65f2fe5296dcbe94640c97b445c9fdca98
SHA512e3af7f591aee84f3c8894b3a5b2a4582aa68444b8e39761c2532da4c3f5c70f9a264012c026be2a5a9a850ee92e9bfb4da05a14335d9c965b82bb0eabbb4011f
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
217KB
MD540569478399884fc7c7952d5ccd6c047
SHA19391fbf0c6ae62dd0e8af86d384ef9df9b8ad2ed
SHA256723a15b1592c52ce7152c761418fe7a99cc260e6005bb26008fb8252738fddc7
SHA5129ec86dc4a50258e00846a0f382ea3056a7e7c8d1413b765880cb28e4deca83e6879647b4fbf1c4844351daf7c06551ddb5b4a31857b7be7f5f9669849e2e2112
-
Filesize
217KB
MD540569478399884fc7c7952d5ccd6c047
SHA19391fbf0c6ae62dd0e8af86d384ef9df9b8ad2ed
SHA256723a15b1592c52ce7152c761418fe7a99cc260e6005bb26008fb8252738fddc7
SHA5129ec86dc4a50258e00846a0f382ea3056a7e7c8d1413b765880cb28e4deca83e6879647b4fbf1c4844351daf7c06551ddb5b4a31857b7be7f5f9669849e2e2112
-
Filesize
217KB
MD540569478399884fc7c7952d5ccd6c047
SHA19391fbf0c6ae62dd0e8af86d384ef9df9b8ad2ed
SHA256723a15b1592c52ce7152c761418fe7a99cc260e6005bb26008fb8252738fddc7
SHA5129ec86dc4a50258e00846a0f382ea3056a7e7c8d1413b765880cb28e4deca83e6879647b4fbf1c4844351daf7c06551ddb5b4a31857b7be7f5f9669849e2e2112
-
Filesize
217KB
MD540569478399884fc7c7952d5ccd6c047
SHA19391fbf0c6ae62dd0e8af86d384ef9df9b8ad2ed
SHA256723a15b1592c52ce7152c761418fe7a99cc260e6005bb26008fb8252738fddc7
SHA5129ec86dc4a50258e00846a0f382ea3056a7e7c8d1413b765880cb28e4deca83e6879647b4fbf1c4844351daf7c06551ddb5b4a31857b7be7f5f9669849e2e2112
-
Filesize
217KB
MD540569478399884fc7c7952d5ccd6c047
SHA19391fbf0c6ae62dd0e8af86d384ef9df9b8ad2ed
SHA256723a15b1592c52ce7152c761418fe7a99cc260e6005bb26008fb8252738fddc7
SHA5129ec86dc4a50258e00846a0f382ea3056a7e7c8d1413b765880cb28e4deca83e6879647b4fbf1c4844351daf7c06551ddb5b4a31857b7be7f5f9669849e2e2112