Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
06-10-2023 13:48
Behavioral task
behavioral1
Sample
NEAS.d9e673a4483626cf1234b34de1d251feexe_JC.exe
Resource
win7-20230831-en
General
-
Target
NEAS.d9e673a4483626cf1234b34de1d251feexe_JC.exe
-
Size
209KB
-
MD5
d9e673a4483626cf1234b34de1d251fe
-
SHA1
afc6a0104e63b5c6c69bcc2153943a789df5bea7
-
SHA256
ebbf37404e5ca10eef0a9149b8c9cb7762beccaa453de116a0cb9afad1c269e0
-
SHA512
f96b45f23a24406669d6ee9c0690ae1f13bd9049e1e69313845115ca496a9ca118cfbead773a76e205715c62baf3b5aacc16bf23d5803642451b86569b4c7c1a
-
SSDEEP
1536:1BucKHs7K2HEG7BpoWiZBYHs977q+7INVdU2Aneb61TVcz+3MJb6rcRBRV:PuchogM57bIL+eb61TVa+3MJb6A7
Malware Config
Extracted
urelas
112.175.88.208
112.175.88.209
112.175.88.207
Signatures
-
Deletes itself 1 IoCs
pid Process 2472 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1504 huter.exe -
Loads dropped DLL 1 IoCs
pid Process 2372 NEAS.d9e673a4483626cf1234b34de1d251feexe_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1504 2372 NEAS.d9e673a4483626cf1234b34de1d251feexe_JC.exe 28 PID 2372 wrote to memory of 1504 2372 NEAS.d9e673a4483626cf1234b34de1d251feexe_JC.exe 28 PID 2372 wrote to memory of 1504 2372 NEAS.d9e673a4483626cf1234b34de1d251feexe_JC.exe 28 PID 2372 wrote to memory of 1504 2372 NEAS.d9e673a4483626cf1234b34de1d251feexe_JC.exe 28 PID 2372 wrote to memory of 2472 2372 NEAS.d9e673a4483626cf1234b34de1d251feexe_JC.exe 29 PID 2372 wrote to memory of 2472 2372 NEAS.d9e673a4483626cf1234b34de1d251feexe_JC.exe 29 PID 2372 wrote to memory of 2472 2372 NEAS.d9e673a4483626cf1234b34de1d251feexe_JC.exe 29 PID 2372 wrote to memory of 2472 2372 NEAS.d9e673a4483626cf1234b34de1d251feexe_JC.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d9e673a4483626cf1234b34de1d251feexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d9e673a4483626cf1234b34de1d251feexe_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
PID:1504
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD502167b944a214fee3d34f9a7e356dc6a
SHA1ca5b3f38a7151268726401593eb35f9b67bdde97
SHA25677fcdadc9ba56daa81edb3f0ef876e38a8c7de56187c28c7d02992cd9e0a243d
SHA512c8976c66724d737105a66699673052d7bc7f1e1941c91e03f97452aaba714d35b1d55434e950b00c58626b8bcf16186a731cccc503b7ba08f080ead3eaca5817
-
Filesize
209KB
MD5df9c953268881910b20a53c587385ac3
SHA1c7092e0316e52464c0330c57f00f8d8e591d0dac
SHA2560942e3fcd7d4ad83bad917271cfe806f6a8064725b7ad8387c5c857aa4c16fc0
SHA51224956f0bbb4a47b160a2bfbb525f69db85b63925f3a6c12b0e98015e7796b5752d25e97f29727b476a5e14cc029da1306bf67dfddc7f860c3565a16c97380e43
-
Filesize
296B
MD5fcd7765a477272d939d92f00d4322c3b
SHA1caeb025fe806359ac690f865c5cabff81c44f512
SHA256236c5c2e3b9c3fa29a7c71bd772103c88993e02898f6a6b011aff8a2834f37c8
SHA512abe933d5a17f8d529639fd4ccb37ba7a970ed57bb86b90d15f9d3ab2be391530098dc9adbd922e28aefc29bb4a6cf478dd1eb52688faec4a52e646a8c58366fe
-
Filesize
296B
MD5fcd7765a477272d939d92f00d4322c3b
SHA1caeb025fe806359ac690f865c5cabff81c44f512
SHA256236c5c2e3b9c3fa29a7c71bd772103c88993e02898f6a6b011aff8a2834f37c8
SHA512abe933d5a17f8d529639fd4ccb37ba7a970ed57bb86b90d15f9d3ab2be391530098dc9adbd922e28aefc29bb4a6cf478dd1eb52688faec4a52e646a8c58366fe
-
Filesize
209KB
MD5df9c953268881910b20a53c587385ac3
SHA1c7092e0316e52464c0330c57f00f8d8e591d0dac
SHA2560942e3fcd7d4ad83bad917271cfe806f6a8064725b7ad8387c5c857aa4c16fc0
SHA51224956f0bbb4a47b160a2bfbb525f69db85b63925f3a6c12b0e98015e7796b5752d25e97f29727b476a5e14cc029da1306bf67dfddc7f860c3565a16c97380e43