Analysis

  • max time kernel
    150s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 09:34

General

  • Target

    4b57e8f561be824d3b07ecc1802e741ae07a7f4089f3f348e8ac12fa7c55f772.exe

  • Size

    136KB

  • MD5

    15e1fc3f5cfd0a5baa08a8c63997f3b0

  • SHA1

    e42a93856d9f2052ee0366a723555ef892f8a837

  • SHA256

    4b57e8f561be824d3b07ecc1802e741ae07a7f4089f3f348e8ac12fa7c55f772

  • SHA512

    94a5a6f5cf8bf429b23926b34cd643c4365d9e3d85e0e8534ebfb4b73bd104f678e7eb117cf9d16aca5730cd6eae11012384596eb4a1d91454686772cc70869a

  • SSDEEP

    3072:fJ8g8EHAaNKWY9pkWdHOYBs7HTbcnp886/kWRBg156CEf+2XC4bskzIYgBS/:fmEt9Y9pkWdHOYBs7HTbcnp886/kWA03

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b57e8f561be824d3b07ecc1802e741ae07a7f4089f3f348e8ac12fa7c55f772.exe
    "C:\Users\Admin\AppData\Local\Temp\4b57e8f561be824d3b07ecc1802e741ae07a7f4089f3f348e8ac12fa7c55f772.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Users\Admin\neoxus.exe
      "C:\Users\Admin\neoxus.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1852

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\neoxus.exe

    Filesize

    136KB

    MD5

    29a94b429a8edd654e41016376e856d7

    SHA1

    8162827cd6718662c76047961082db873f10f5f1

    SHA256

    2cfb10cf04fc7c558006013ecbbad026e1669a383b90d900ada05b62c8168b88

    SHA512

    c1bc9a9bb481cbb3bf0944acdaf5e77915e79529cd13974f9c102e2926284b19644d3204974ccb3ae0659715c8ea1045093abdbf13e0e133e309433b64003397

  • C:\Users\Admin\neoxus.exe

    Filesize

    136KB

    MD5

    29a94b429a8edd654e41016376e856d7

    SHA1

    8162827cd6718662c76047961082db873f10f5f1

    SHA256

    2cfb10cf04fc7c558006013ecbbad026e1669a383b90d900ada05b62c8168b88

    SHA512

    c1bc9a9bb481cbb3bf0944acdaf5e77915e79529cd13974f9c102e2926284b19644d3204974ccb3ae0659715c8ea1045093abdbf13e0e133e309433b64003397

  • \Users\Admin\neoxus.exe

    Filesize

    136KB

    MD5

    29a94b429a8edd654e41016376e856d7

    SHA1

    8162827cd6718662c76047961082db873f10f5f1

    SHA256

    2cfb10cf04fc7c558006013ecbbad026e1669a383b90d900ada05b62c8168b88

    SHA512

    c1bc9a9bb481cbb3bf0944acdaf5e77915e79529cd13974f9c102e2926284b19644d3204974ccb3ae0659715c8ea1045093abdbf13e0e133e309433b64003397

  • \Users\Admin\neoxus.exe

    Filesize

    136KB

    MD5

    29a94b429a8edd654e41016376e856d7

    SHA1

    8162827cd6718662c76047961082db873f10f5f1

    SHA256

    2cfb10cf04fc7c558006013ecbbad026e1669a383b90d900ada05b62c8168b88

    SHA512

    c1bc9a9bb481cbb3bf0944acdaf5e77915e79529cd13974f9c102e2926284b19644d3204974ccb3ae0659715c8ea1045093abdbf13e0e133e309433b64003397

  • memory/900-56-0x0000000075C61000-0x0000000075C63000-memory.dmp

    Filesize

    8KB