Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 17:12
Behavioral task
behavioral1
Sample
NEAS.09bd6d09eff43415ca44a1c1e6b09f70_JC.exe
Resource
win7-20230831-en
General
-
Target
NEAS.09bd6d09eff43415ca44a1c1e6b09f70_JC.exe
-
Size
235KB
-
MD5
09bd6d09eff43415ca44a1c1e6b09f70
-
SHA1
ae29c63e39d65c7293207e89cd748e3763e18186
-
SHA256
995fe06ab9417f50c623fd3bebf9cf04e54d35b1c05d19ad631d4381cc2d2636
-
SHA512
df9658fbdb95bf2e0977c52f5fbf3aa6b85691f4827f909004f5bbb7bc9f7d136a89b88f8df37aa98d14e35705073cb2592efe320178ec38a0b0629f6af56baa
-
SSDEEP
6144:LEPAc72ss5pKL93yMax7pH3F2d1ugMeSWp:LE32xpoaxBFg1ugMeS
Malware Config
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2756 explothe.exe 2516 explothe.exe 2716 explothe.exe 792 explothe.exe -
Loads dropped DLL 5 IoCs
pid Process 2408 NEAS.09bd6d09eff43415ca44a1c1e6b09f70_JC.exe 2320 rundll32.exe 2320 rundll32.exe 2320 rundll32.exe 2320 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2560 schtasks.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2756 2408 NEAS.09bd6d09eff43415ca44a1c1e6b09f70_JC.exe 28 PID 2408 wrote to memory of 2756 2408 NEAS.09bd6d09eff43415ca44a1c1e6b09f70_JC.exe 28 PID 2408 wrote to memory of 2756 2408 NEAS.09bd6d09eff43415ca44a1c1e6b09f70_JC.exe 28 PID 2408 wrote to memory of 2756 2408 NEAS.09bd6d09eff43415ca44a1c1e6b09f70_JC.exe 28 PID 2756 wrote to memory of 2560 2756 explothe.exe 29 PID 2756 wrote to memory of 2560 2756 explothe.exe 29 PID 2756 wrote to memory of 2560 2756 explothe.exe 29 PID 2756 wrote to memory of 2560 2756 explothe.exe 29 PID 2756 wrote to memory of 2664 2756 explothe.exe 31 PID 2756 wrote to memory of 2664 2756 explothe.exe 31 PID 2756 wrote to memory of 2664 2756 explothe.exe 31 PID 2756 wrote to memory of 2664 2756 explothe.exe 31 PID 2664 wrote to memory of 2748 2664 cmd.exe 33 PID 2664 wrote to memory of 2748 2664 cmd.exe 33 PID 2664 wrote to memory of 2748 2664 cmd.exe 33 PID 2664 wrote to memory of 2748 2664 cmd.exe 33 PID 2664 wrote to memory of 2660 2664 cmd.exe 34 PID 2664 wrote to memory of 2660 2664 cmd.exe 34 PID 2664 wrote to memory of 2660 2664 cmd.exe 34 PID 2664 wrote to memory of 2660 2664 cmd.exe 34 PID 2664 wrote to memory of 2576 2664 cmd.exe 35 PID 2664 wrote to memory of 2576 2664 cmd.exe 35 PID 2664 wrote to memory of 2576 2664 cmd.exe 35 PID 2664 wrote to memory of 2576 2664 cmd.exe 35 PID 2664 wrote to memory of 1252 2664 cmd.exe 36 PID 2664 wrote to memory of 1252 2664 cmd.exe 36 PID 2664 wrote to memory of 1252 2664 cmd.exe 36 PID 2664 wrote to memory of 1252 2664 cmd.exe 36 PID 2664 wrote to memory of 2948 2664 cmd.exe 37 PID 2664 wrote to memory of 2948 2664 cmd.exe 37 PID 2664 wrote to memory of 2948 2664 cmd.exe 37 PID 2664 wrote to memory of 2948 2664 cmd.exe 37 PID 2664 wrote to memory of 2620 2664 cmd.exe 38 PID 2664 wrote to memory of 2620 2664 cmd.exe 38 PID 2664 wrote to memory of 2620 2664 cmd.exe 38 PID 2664 wrote to memory of 2620 2664 cmd.exe 38 PID 2640 wrote to memory of 2516 2640 taskeng.exe 40 PID 2640 wrote to memory of 2516 2640 taskeng.exe 40 PID 2640 wrote to memory of 2516 2640 taskeng.exe 40 PID 2640 wrote to memory of 2516 2640 taskeng.exe 40 PID 2756 wrote to memory of 2320 2756 explothe.exe 44 PID 2756 wrote to memory of 2320 2756 explothe.exe 44 PID 2756 wrote to memory of 2320 2756 explothe.exe 44 PID 2756 wrote to memory of 2320 2756 explothe.exe 44 PID 2756 wrote to memory of 2320 2756 explothe.exe 44 PID 2756 wrote to memory of 2320 2756 explothe.exe 44 PID 2756 wrote to memory of 2320 2756 explothe.exe 44 PID 2640 wrote to memory of 2716 2640 taskeng.exe 45 PID 2640 wrote to memory of 2716 2640 taskeng.exe 45 PID 2640 wrote to memory of 2716 2640 taskeng.exe 45 PID 2640 wrote to memory of 2716 2640 taskeng.exe 45 PID 2640 wrote to memory of 792 2640 taskeng.exe 46 PID 2640 wrote to memory of 792 2640 taskeng.exe 46 PID 2640 wrote to memory of 792 2640 taskeng.exe 46 PID 2640 wrote to memory of 792 2640 taskeng.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.09bd6d09eff43415ca44a1c1e6b09f70_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.09bd6d09eff43415ca44a1c1e6b09f70_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F3⤵
- Creates scheduled task(s)
PID:2560
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2748
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"4⤵PID:2660
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E4⤵PID:2576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1252
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"4⤵PID:2948
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E4⤵PID:2620
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:2320
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {34D84161-00CE-4DE0-B5FE-7000B827EC86} S-1-5-21-607259312-1573743425-2763420908-1000:NGTQGRML\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe2⤵
- Executes dropped EXE
PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe2⤵
- Executes dropped EXE
PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe2⤵
- Executes dropped EXE
PID:792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235KB
MD509bd6d09eff43415ca44a1c1e6b09f70
SHA1ae29c63e39d65c7293207e89cd748e3763e18186
SHA256995fe06ab9417f50c623fd3bebf9cf04e54d35b1c05d19ad631d4381cc2d2636
SHA512df9658fbdb95bf2e0977c52f5fbf3aa6b85691f4827f909004f5bbb7bc9f7d136a89b88f8df37aa98d14e35705073cb2592efe320178ec38a0b0629f6af56baa
-
Filesize
235KB
MD509bd6d09eff43415ca44a1c1e6b09f70
SHA1ae29c63e39d65c7293207e89cd748e3763e18186
SHA256995fe06ab9417f50c623fd3bebf9cf04e54d35b1c05d19ad631d4381cc2d2636
SHA512df9658fbdb95bf2e0977c52f5fbf3aa6b85691f4827f909004f5bbb7bc9f7d136a89b88f8df37aa98d14e35705073cb2592efe320178ec38a0b0629f6af56baa
-
Filesize
235KB
MD509bd6d09eff43415ca44a1c1e6b09f70
SHA1ae29c63e39d65c7293207e89cd748e3763e18186
SHA256995fe06ab9417f50c623fd3bebf9cf04e54d35b1c05d19ad631d4381cc2d2636
SHA512df9658fbdb95bf2e0977c52f5fbf3aa6b85691f4827f909004f5bbb7bc9f7d136a89b88f8df37aa98d14e35705073cb2592efe320178ec38a0b0629f6af56baa
-
Filesize
235KB
MD509bd6d09eff43415ca44a1c1e6b09f70
SHA1ae29c63e39d65c7293207e89cd748e3763e18186
SHA256995fe06ab9417f50c623fd3bebf9cf04e54d35b1c05d19ad631d4381cc2d2636
SHA512df9658fbdb95bf2e0977c52f5fbf3aa6b85691f4827f909004f5bbb7bc9f7d136a89b88f8df37aa98d14e35705073cb2592efe320178ec38a0b0629f6af56baa
-
Filesize
235KB
MD509bd6d09eff43415ca44a1c1e6b09f70
SHA1ae29c63e39d65c7293207e89cd748e3763e18186
SHA256995fe06ab9417f50c623fd3bebf9cf04e54d35b1c05d19ad631d4381cc2d2636
SHA512df9658fbdb95bf2e0977c52f5fbf3aa6b85691f4827f909004f5bbb7bc9f7d136a89b88f8df37aa98d14e35705073cb2592efe320178ec38a0b0629f6af56baa
-
Filesize
235KB
MD509bd6d09eff43415ca44a1c1e6b09f70
SHA1ae29c63e39d65c7293207e89cd748e3763e18186
SHA256995fe06ab9417f50c623fd3bebf9cf04e54d35b1c05d19ad631d4381cc2d2636
SHA512df9658fbdb95bf2e0977c52f5fbf3aa6b85691f4827f909004f5bbb7bc9f7d136a89b88f8df37aa98d14e35705073cb2592efe320178ec38a0b0629f6af56baa
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
235KB
MD509bd6d09eff43415ca44a1c1e6b09f70
SHA1ae29c63e39d65c7293207e89cd748e3763e18186
SHA256995fe06ab9417f50c623fd3bebf9cf04e54d35b1c05d19ad631d4381cc2d2636
SHA512df9658fbdb95bf2e0977c52f5fbf3aa6b85691f4827f909004f5bbb7bc9f7d136a89b88f8df37aa98d14e35705073cb2592efe320178ec38a0b0629f6af56baa
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4