Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 20:24
Behavioral task
behavioral1
Sample
NEAS.5a28d6f64a40b3e80bdcff39b67df1e0.exe
Resource
win7-20230831-en
General
-
Target
NEAS.5a28d6f64a40b3e80bdcff39b67df1e0.exe
-
Size
463KB
-
MD5
5a28d6f64a40b3e80bdcff39b67df1e0
-
SHA1
524773a06f6c2a3325ec4e1ca72de2abb44d243d
-
SHA256
3d1ffb6aeb7a9c23af7ef97afb41c8cddca766e535b2301286c2c4ce4050b1bf
-
SHA512
7ac0c9d3178259ace1bc7619f9278af2fee1eb3ff3cb7f0943426174afa07e5e754fa9684dbdf3b29b8686ca531809333e0243c19f640c9be98289ba2c62925f
-
SSDEEP
6144:P8Eoe/IebBVMweZGhHdJBV70FVKLbfW2x8VyMsmD6gzOmjpi+pMJQ8uUm9unpmh:vDdUGhHdJ370FVKmP0Ml+gzzjp+lsu8
Malware Config
Extracted
urelas
121.88.5.183
218.54.30.235
121.88.5.181
112.223.217.101
Signatures
-
Deletes itself 1 IoCs
pid Process 2140 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2408 sander.exe 2756 ctfmom.exe -
Loads dropped DLL 2 IoCs
pid Process 2116 NEAS.5a28d6f64a40b3e80bdcff39b67df1e0.exe 2408 sander.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe 2756 ctfmom.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2408 2116 NEAS.5a28d6f64a40b3e80bdcff39b67df1e0.exe 28 PID 2116 wrote to memory of 2408 2116 NEAS.5a28d6f64a40b3e80bdcff39b67df1e0.exe 28 PID 2116 wrote to memory of 2408 2116 NEAS.5a28d6f64a40b3e80bdcff39b67df1e0.exe 28 PID 2116 wrote to memory of 2408 2116 NEAS.5a28d6f64a40b3e80bdcff39b67df1e0.exe 28 PID 2116 wrote to memory of 2140 2116 NEAS.5a28d6f64a40b3e80bdcff39b67df1e0.exe 29 PID 2116 wrote to memory of 2140 2116 NEAS.5a28d6f64a40b3e80bdcff39b67df1e0.exe 29 PID 2116 wrote to memory of 2140 2116 NEAS.5a28d6f64a40b3e80bdcff39b67df1e0.exe 29 PID 2116 wrote to memory of 2140 2116 NEAS.5a28d6f64a40b3e80bdcff39b67df1e0.exe 29 PID 2408 wrote to memory of 2756 2408 sander.exe 33 PID 2408 wrote to memory of 2756 2408 sander.exe 33 PID 2408 wrote to memory of 2756 2408 sander.exe 33 PID 2408 wrote to memory of 2756 2408 sander.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5a28d6f64a40b3e80bdcff39b67df1e0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5a28d6f64a40b3e80bdcff39b67df1e0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\sander.exe"C:\Users\Admin\AppData\Local\Temp\sander.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\ctfmom.exe"C:\Users\Admin\AppData\Local\Temp\ctfmom.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2756
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_sannuyex.bat" "2⤵
- Deletes itself
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
287B
MD5b9832515e4af88cb3ad8fd62749168cc
SHA16e4450bdfa74e24190c24b377d142806e2c6c03e
SHA256973bdccc6ead6d82f3581dfcc0d47128b58c13ddac4439efd8b23587402b22d5
SHA51267270cab451a0f406a24642ad45effbdbf1b4fbd87d91b900425bbc20c4b5dbdeb0d84103bfe96a474e9432d5672ce244c82dbd1068cdd3d6f8ac89c4b1f7ca3
-
Filesize
287B
MD5b9832515e4af88cb3ad8fd62749168cc
SHA16e4450bdfa74e24190c24b377d142806e2c6c03e
SHA256973bdccc6ead6d82f3581dfcc0d47128b58c13ddac4439efd8b23587402b22d5
SHA51267270cab451a0f406a24642ad45effbdbf1b4fbd87d91b900425bbc20c4b5dbdeb0d84103bfe96a474e9432d5672ce244c82dbd1068cdd3d6f8ac89c4b1f7ca3
-
Filesize
221KB
MD5c4db3c52a70aad97642f77bb883d51e1
SHA132d140273f436d6f5f82cb7d7ae30a9465aa26f3
SHA256f7ef8cd79c13dcaf786f105fffd2860fa8be3bdc89e4d365fc16578e97c5e481
SHA5120fafc2bb62f087aaa0d4e2bf2658c167c7d987a3ff7d7eeea32997c9dbf8dc03af0b06318b6fe83588e90a822df671021f1a3b7708a95675d99bd7a3e10f2c2d
-
Filesize
512B
MD504113afab96ff36e7da4cabf336079cf
SHA12ab6a01f123c1ef4227cb134612749b67a237bf6
SHA2568b3cc0c31002ffa60f497966a671ff1c0a23a6efa831bd2be2cfbee7588bac16
SHA51268358e6ae577e59dd540c31d4cfcf56968d9b84416ffcd527867711165d78a9f351da0bf41afab96107b1dc736467b092f5b79be2b8f7f96f6871e4a0b5472e9
-
Filesize
463KB
MD510c9b2a6b9f090ac0c7076ab59d292bc
SHA1d1528ead227b123221757280e3931f471db554e9
SHA256d134a577d57c0bcd9e6cd83d7c9b2cc9635b05ec6721cb1d4e3ae284ac41593d
SHA512b8b465a07fa19a98c8a7c03f359ad699253e4cb7ffa820735933727920c0324632a2b04f048b1f4588cf97040419cd7d0435ed4841a225d5192b2632a7b18637
-
Filesize
221KB
MD5c4db3c52a70aad97642f77bb883d51e1
SHA132d140273f436d6f5f82cb7d7ae30a9465aa26f3
SHA256f7ef8cd79c13dcaf786f105fffd2860fa8be3bdc89e4d365fc16578e97c5e481
SHA5120fafc2bb62f087aaa0d4e2bf2658c167c7d987a3ff7d7eeea32997c9dbf8dc03af0b06318b6fe83588e90a822df671021f1a3b7708a95675d99bd7a3e10f2c2d
-
Filesize
463KB
MD510c9b2a6b9f090ac0c7076ab59d292bc
SHA1d1528ead227b123221757280e3931f471db554e9
SHA256d134a577d57c0bcd9e6cd83d7c9b2cc9635b05ec6721cb1d4e3ae284ac41593d
SHA512b8b465a07fa19a98c8a7c03f359ad699253e4cb7ffa820735933727920c0324632a2b04f048b1f4588cf97040419cd7d0435ed4841a225d5192b2632a7b18637