Analysis
-
max time kernel
152s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 15:15
Static task
static1
Behavioral task
behavioral1
Sample
dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe
Resource
win10v2004-20220812-en
General
-
Target
dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe
-
Size
83KB
-
MD5
9049bf191917a227e1fffc4f0f80aa90
-
SHA1
e56f0b6a7eb81e5f38cb7da359e56dd61b443030
-
SHA256
dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78
-
SHA512
20c09ee60ba0860d5ae1cffca7e24a47df95630864ad023b3f7ec16ab3346702546dbc67916a77336bff181ea32535e1c9d39a6292c4b8dba18932ba909c45a5
-
SSDEEP
1536:sIWOv8sIxm87bbGwoLNqx+hAc1Xaq/rSyVEIhf49ZcNU:4OvGSOcd/zXak82NU
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" neiun.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe -
Executes dropped EXE 2 IoCs
pid Process 1680 neiun.exe 1552 neiun.exe -
Loads dropped DLL 2 IoCs
pid Process 1948 dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe 1948 dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ neiun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /t" neiun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /r" neiun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /z" neiun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /b" neiun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /f" dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /d" neiun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /x" neiun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /f" neiun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /e" neiun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /g" neiun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /p" neiun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /n" neiun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /u" neiun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /w" neiun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /s" neiun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /o" neiun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /h" neiun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /y" neiun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /c" neiun.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /j" neiun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /k" neiun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /i" neiun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /a" neiun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /l" neiun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /v" neiun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /m" neiun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\neiun = "C:\\Users\\Admin\\neiun.exe /q" neiun.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum neiun.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 neiun.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\c\autorun.inf neiun.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1324 set thread context of 1948 1324 dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe 28 PID 1680 set thread context of 1552 1680 neiun.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1948 dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe 1552 neiun.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1324 dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe 1948 dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe 1680 neiun.exe 1552 neiun.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1324 wrote to memory of 1948 1324 dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe 28 PID 1324 wrote to memory of 1948 1324 dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe 28 PID 1324 wrote to memory of 1948 1324 dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe 28 PID 1324 wrote to memory of 1948 1324 dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe 28 PID 1324 wrote to memory of 1948 1324 dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe 28 PID 1324 wrote to memory of 1948 1324 dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe 28 PID 1324 wrote to memory of 1948 1324 dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe 28 PID 1324 wrote to memory of 1948 1324 dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe 28 PID 1324 wrote to memory of 1948 1324 dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe 28 PID 1324 wrote to memory of 1948 1324 dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe 28 PID 1948 wrote to memory of 1680 1948 dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe 29 PID 1948 wrote to memory of 1680 1948 dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe 29 PID 1948 wrote to memory of 1680 1948 dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe 29 PID 1948 wrote to memory of 1680 1948 dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe 29 PID 1680 wrote to memory of 1552 1680 neiun.exe 30 PID 1680 wrote to memory of 1552 1680 neiun.exe 30 PID 1680 wrote to memory of 1552 1680 neiun.exe 30 PID 1680 wrote to memory of 1552 1680 neiun.exe 30 PID 1680 wrote to memory of 1552 1680 neiun.exe 30 PID 1680 wrote to memory of 1552 1680 neiun.exe 30 PID 1680 wrote to memory of 1552 1680 neiun.exe 30 PID 1680 wrote to memory of 1552 1680 neiun.exe 30 PID 1680 wrote to memory of 1552 1680 neiun.exe 30 PID 1680 wrote to memory of 1552 1680 neiun.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe"C:\Users\Admin\AppData\Local\Temp\dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78.exe712⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\neiun.exe"C:\Users\Admin\neiun.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\neiun.exe714⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1552
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD59049bf191917a227e1fffc4f0f80aa90
SHA1e56f0b6a7eb81e5f38cb7da359e56dd61b443030
SHA256dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78
SHA51220c09ee60ba0860d5ae1cffca7e24a47df95630864ad023b3f7ec16ab3346702546dbc67916a77336bff181ea32535e1c9d39a6292c4b8dba18932ba909c45a5
-
Filesize
83KB
MD59049bf191917a227e1fffc4f0f80aa90
SHA1e56f0b6a7eb81e5f38cb7da359e56dd61b443030
SHA256dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78
SHA51220c09ee60ba0860d5ae1cffca7e24a47df95630864ad023b3f7ec16ab3346702546dbc67916a77336bff181ea32535e1c9d39a6292c4b8dba18932ba909c45a5
-
Filesize
83KB
MD59049bf191917a227e1fffc4f0f80aa90
SHA1e56f0b6a7eb81e5f38cb7da359e56dd61b443030
SHA256dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78
SHA51220c09ee60ba0860d5ae1cffca7e24a47df95630864ad023b3f7ec16ab3346702546dbc67916a77336bff181ea32535e1c9d39a6292c4b8dba18932ba909c45a5
-
Filesize
83KB
MD59049bf191917a227e1fffc4f0f80aa90
SHA1e56f0b6a7eb81e5f38cb7da359e56dd61b443030
SHA256dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78
SHA51220c09ee60ba0860d5ae1cffca7e24a47df95630864ad023b3f7ec16ab3346702546dbc67916a77336bff181ea32535e1c9d39a6292c4b8dba18932ba909c45a5
-
Filesize
83KB
MD59049bf191917a227e1fffc4f0f80aa90
SHA1e56f0b6a7eb81e5f38cb7da359e56dd61b443030
SHA256dc863c2b155b3e72ab29e5bc2ef9b163565e772c4250dc0bbf131bf033100f78
SHA51220c09ee60ba0860d5ae1cffca7e24a47df95630864ad023b3f7ec16ab3346702546dbc67916a77336bff181ea32535e1c9d39a6292c4b8dba18932ba909c45a5