Analysis

  • max time kernel
    143s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/11/2023, 16:58

General

  • Target

    NEAS.9b1afa6c0c9899d9a6dcd2f2f151d440_JC.exe

  • Size

    73KB

  • MD5

    9b1afa6c0c9899d9a6dcd2f2f151d440

  • SHA1

    c1fc0eacfef90e666d30bda1f8190dba093b5a42

  • SHA256

    4d1822b8829e41af0f8a363b08d6777468a7b602cbff9999cf15b37d3ce6c016

  • SHA512

    76fab8a29449d95cc030df5043447988a64b9b865dcd08c989a8c6fd23ed83aa29a9b46a02a0cebe87bfb7ae796063c79714833b0fef09019c744114b200d974

  • SSDEEP

    1536:MgSeGDjtQhnwmmB0yjMqqUM2mr3IdE8mne0Avu5r++yy7CA7GcIaapavdv:MMSjOnrmBbMqqMmr3IdE8we0Avu5r++N

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.9b1afa6c0c9899d9a6dcd2f2f151d440_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.9b1afa6c0c9899d9a6dcd2f2f151d440_JC.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Windows\SysWOW64\nslookup.exe
      nslookup nomoreransom.bit dns1.soprodns.ru
      2⤵
        PID:3792
      • C:\Windows\SysWOW64\nslookup.exe
        nslookup emsisoft.bit dns1.soprodns.ru
        2⤵
          PID:4948
        • C:\Windows\SysWOW64\nslookup.exe
          nslookup gandcrab.bit dns1.soprodns.ru
          2⤵
            PID:4060
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup nomoreransom.bit dns1.soprodns.ru
            2⤵
              PID:1340
            • C:\Windows\SysWOW64\nslookup.exe
              nslookup emsisoft.bit dns1.soprodns.ru
              2⤵
                PID:3296
              • C:\Windows\SysWOW64\nslookup.exe
                nslookup gandcrab.bit dns1.soprodns.ru
                2⤵
                  PID:3492
                • C:\Windows\SysWOW64\nslookup.exe
                  nslookup nomoreransom.bit dns1.soprodns.ru
                  2⤵
                    PID:4164
                  • C:\Windows\SysWOW64\nslookup.exe
                    nslookup emsisoft.bit dns1.soprodns.ru
                    2⤵
                      PID:740
                    • C:\Windows\SysWOW64\nslookup.exe
                      nslookup gandcrab.bit dns1.soprodns.ru
                      2⤵
                        PID:4440
                      • C:\Windows\SysWOW64\nslookup.exe
                        nslookup nomoreransom.bit dns1.soprodns.ru
                        2⤵
                          PID:4624
                        • C:\Windows\SysWOW64\nslookup.exe
                          nslookup emsisoft.bit dns1.soprodns.ru
                          2⤵
                            PID:1596
                          • C:\Windows\SysWOW64\nslookup.exe
                            nslookup gandcrab.bit dns1.soprodns.ru
                            2⤵
                              PID:1680
                            • C:\Windows\SysWOW64\nslookup.exe
                              nslookup nomoreransom.bit dns1.soprodns.ru
                              2⤵
                                PID:3572
                              • C:\Windows\SysWOW64\nslookup.exe
                                nslookup emsisoft.bit dns1.soprodns.ru
                                2⤵
                                  PID:2744
                              • C:\Windows\system32\rundll32.exe
                                "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
                                1⤵
                                  PID:2560
                                • C:\Windows\System32\svchost.exe
                                  C:\Windows\System32\svchost.exe -k UnistackSvcGroup
                                  1⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3048

                                Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

                                        Filesize

                                        16KB

                                        MD5

                                        301cd52fc1fbd996b8e7ac7db4de9100

                                        SHA1

                                        01cd44949b38ee96be9cdd34fbad86b4a06cfbae

                                        SHA256

                                        eea07ea9c13dc3a1eb342162fa920bdc5e1e38f861781780f3e0ba12da17413f

                                        SHA512

                                        9178b3ae3237a83af2f9fda582e8edda035c68fe6c66dd0e7b0eca0ef9803c0772f258d19e9ff009d63466523255db162405b6003940fbff44886a56c708b9be

                                      • memory/3048-43-0x000001E27CE50000-0x000001E27CE51000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3048-45-0x000001E27CE50000-0x000001E27CE51000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3048-36-0x000001E27CE50000-0x000001E27CE51000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3048-37-0x000001E27CE50000-0x000001E27CE51000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3048-38-0x000001E27CE50000-0x000001E27CE51000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3048-39-0x000001E27CE50000-0x000001E27CE51000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3048-40-0x000001E27CE50000-0x000001E27CE51000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3048-41-0x000001E27CE50000-0x000001E27CE51000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3048-42-0x000001E27CE50000-0x000001E27CE51000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3048-46-0x000001E27CA70000-0x000001E27CA71000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3048-35-0x000001E27CE20000-0x000001E27CE21000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3048-44-0x000001E27CE50000-0x000001E27CE51000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3048-3-0x000001E278740000-0x000001E278750000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/3048-47-0x000001E27CA60000-0x000001E27CA61000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3048-49-0x000001E27CA70000-0x000001E27CA71000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3048-52-0x000001E27CA60000-0x000001E27CA61000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3048-55-0x000001E27C9A0000-0x000001E27C9A1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3048-19-0x000001E278840000-0x000001E278850000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/3048-67-0x000001E27CBA0000-0x000001E27CBA1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3048-69-0x000001E27CBB0000-0x000001E27CBB1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3048-70-0x000001E27CBB0000-0x000001E27CBB1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3048-71-0x000001E27CCC0000-0x000001E27CCC1000-memory.dmp

                                        Filesize

                                        4KB