Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
12/11/2023, 18:07
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.213cfd32e2da38286425cc9d36e9389f.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.213cfd32e2da38286425cc9d36e9389f.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.213cfd32e2da38286425cc9d36e9389f.exe
-
Size
208KB
-
MD5
213cfd32e2da38286425cc9d36e9389f
-
SHA1
faa3ea563aa19c5897c6116805db42a272e1adf2
-
SHA256
cbc97c82ea12518215510a3cb3982880eedda1232d52c1f204f23c98bd7998fc
-
SHA512
77313ccec5cd367ef3da45a48f9d4a431ef1c223ef0cfa2bbbdf247543c9ee06b123f97e881979915f1a4b5a1da17648e83ef241819a16e1a1118dc02be24d57
-
SSDEEP
3072:z4D0ZbTVnmUU8UYBGFLivSaWMEVm7LxX4NLthEjQT6j:zFVVnG8HGFLivSQ1QEj1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2772 FWJH.exe -
Loads dropped DLL 2 IoCs
pid Process 2612 cmd.exe 2612 cmd.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\windows\SysWOW64\FWJH.exe NEAS.213cfd32e2da38286425cc9d36e9389f.exe File opened for modification C:\windows\SysWOW64\FWJH.exe NEAS.213cfd32e2da38286425cc9d36e9389f.exe File created C:\windows\SysWOW64\FWJH.exe.bat NEAS.213cfd32e2da38286425cc9d36e9389f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1736 NEAS.213cfd32e2da38286425cc9d36e9389f.exe 2772 FWJH.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1736 NEAS.213cfd32e2da38286425cc9d36e9389f.exe 1736 NEAS.213cfd32e2da38286425cc9d36e9389f.exe 2772 FWJH.exe 2772 FWJH.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2612 1736 NEAS.213cfd32e2da38286425cc9d36e9389f.exe 28 PID 1736 wrote to memory of 2612 1736 NEAS.213cfd32e2da38286425cc9d36e9389f.exe 28 PID 1736 wrote to memory of 2612 1736 NEAS.213cfd32e2da38286425cc9d36e9389f.exe 28 PID 1736 wrote to memory of 2612 1736 NEAS.213cfd32e2da38286425cc9d36e9389f.exe 28 PID 2612 wrote to memory of 2772 2612 cmd.exe 30 PID 2612 wrote to memory of 2772 2612 cmd.exe 30 PID 2612 wrote to memory of 2772 2612 cmd.exe 30 PID 2612 wrote to memory of 2772 2612 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.213cfd32e2da38286425cc9d36e9389f.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.213cfd32e2da38286425cc9d36e9389f.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\system32\FWJH.exe.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\windows\SysWOW64\FWJH.exeC:\windows\system32\FWJH.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD50a8fcbd24e0328e0ec01d75b9e79bbf2
SHA1967ff4b3ecb719de4532d7165e8ea9914a9fef55
SHA256a0db64231b1ba57209895792c7a450867dbb36b0750821082e51999c7ed903c0
SHA512d1dd9681b5a83154dcce186e0d85922821999f9f900f7bae25b5dc848b341f174756036a91a51b600ebafdacd647ae4bc2018c462d8b669c996c7b2436476e58
-
Filesize
72B
MD538f7b64a9ff9f26d8f33f70852b52d2c
SHA1ce7c3e27247c7f3e77fb384ebea83a71e6f770f0
SHA25642353b10f9dedccbe7d2d79269ebebfb40f32ce41832b637aeaa0fef46a1b5d5
SHA51289cbe20be2aa02521e46d85c112bcecef5e5020bdb9000946941967729f096315c9aacee9d57ffce2f6239f68e29118f2226a5c6d6666dfb7ca12773a102e99d
-
Filesize
208KB
MD50a8fcbd24e0328e0ec01d75b9e79bbf2
SHA1967ff4b3ecb719de4532d7165e8ea9914a9fef55
SHA256a0db64231b1ba57209895792c7a450867dbb36b0750821082e51999c7ed903c0
SHA512d1dd9681b5a83154dcce186e0d85922821999f9f900f7bae25b5dc848b341f174756036a91a51b600ebafdacd647ae4bc2018c462d8b669c996c7b2436476e58
-
Filesize
72B
MD538f7b64a9ff9f26d8f33f70852b52d2c
SHA1ce7c3e27247c7f3e77fb384ebea83a71e6f770f0
SHA25642353b10f9dedccbe7d2d79269ebebfb40f32ce41832b637aeaa0fef46a1b5d5
SHA51289cbe20be2aa02521e46d85c112bcecef5e5020bdb9000946941967729f096315c9aacee9d57ffce2f6239f68e29118f2226a5c6d6666dfb7ca12773a102e99d
-
Filesize
208KB
MD50a8fcbd24e0328e0ec01d75b9e79bbf2
SHA1967ff4b3ecb719de4532d7165e8ea9914a9fef55
SHA256a0db64231b1ba57209895792c7a450867dbb36b0750821082e51999c7ed903c0
SHA512d1dd9681b5a83154dcce186e0d85922821999f9f900f7bae25b5dc848b341f174756036a91a51b600ebafdacd647ae4bc2018c462d8b669c996c7b2436476e58
-
Filesize
208KB
MD50a8fcbd24e0328e0ec01d75b9e79bbf2
SHA1967ff4b3ecb719de4532d7165e8ea9914a9fef55
SHA256a0db64231b1ba57209895792c7a450867dbb36b0750821082e51999c7ed903c0
SHA512d1dd9681b5a83154dcce186e0d85922821999f9f900f7bae25b5dc848b341f174756036a91a51b600ebafdacd647ae4bc2018c462d8b669c996c7b2436476e58