Analysis
-
max time kernel
87s -
max time network
46s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2024 20:04
Static task
static1
Behavioral task
behavioral1
Sample
ac9a11d946a42651544b39bf10331e52.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ac9a11d946a42651544b39bf10331e52.exe
Resource
win10v2004-20231215-en
General
-
Target
ac9a11d946a42651544b39bf10331e52.exe
-
Size
724KB
-
MD5
ac9a11d946a42651544b39bf10331e52
-
SHA1
2d3ab1c631e65c3d47e1dced6fbbf652729a23af
-
SHA256
42297f69e8cd1f6de26901cdf1c30987157e345a291fc2deaa7943fa81128a2e
-
SHA512
2a76c997cbf2c3d285534b9755f854f96d211a264b3293b32da222b5dd57776e61a1cd56b968f2186d5a4be6f5a22079f729741c962db578a0bc6769aff97711
-
SSDEEP
12288:71/aGLDCMNpNAkoSzZWD8ayX2MQCw7D0qWIgQjyp/5Z1qwyEHMeF0XxfKzrY:71/aGLDCM4D8ayGMGdWrbgBKzrY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4004 neccd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\neccd.exe" neccd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4272 wrote to memory of 4004 4272 ac9a11d946a42651544b39bf10331e52.exe 93 PID 4272 wrote to memory of 4004 4272 ac9a11d946a42651544b39bf10331e52.exe 93 PID 4272 wrote to memory of 4004 4272 ac9a11d946a42651544b39bf10331e52.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac9a11d946a42651544b39bf10331e52.exe"C:\Users\Admin\AppData\Local\Temp\ac9a11d946a42651544b39bf10331e52.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\ProgramData\neccd.exe"C:\ProgramData\neccd.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5721279614367b85a12c170ea4d9d7880
SHA13a7f9df3c836aed3b28f008b303947b7eaf4b969
SHA256099a5994ce0b6d182f14b4aedcbbe0aacff770fa061995084a4cb1e0429a5c9e
SHA512aaeb678e78d5bf9badedce282d34d632acfb84c339dbe49254ed58da64b67e5cb3bdeb537c45e46a564bd03ab1198c405aadcccabc00ab6f6c0c96a912b2184e
-
Filesize
1KB
MD52ff629b5d3035af0edc4ae85ecc127e9
SHA1871aeca2177b474eb2af17d6efb7c9543c36190f
SHA2565e28adea167f45103bf38a69fad433137f8c11da21f2c455b0c85d0b335ea0a7
SHA51271432462e906346f72647228a6b2b653629b539b8c025f69fd6315f62ae0d512b96c624c62139676882991176034985237c8cb0a044b2b44e45059eaf7e2f7be