Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 19:45
Behavioral task
behavioral1
Sample
NEAS.1729d58ca7e1bbfa82e145ba2ae33840.exe
Resource
win7-20230831-en
General
-
Target
NEAS.1729d58ca7e1bbfa82e145ba2ae33840.exe
-
Size
191KB
-
MD5
1729d58ca7e1bbfa82e145ba2ae33840
-
SHA1
b7ede0c80f8d818c24f1cfac13a85bc5343c9fc2
-
SHA256
bd28957cd5528ae2fd0e52f267d680d2998211688ef0edba0747fa95c52bd691
-
SHA512
2e1041465e64e42b20fcf404c6a8f340a48e4a5e88cdeb11f48df0b7e225c70dcfc4324e00f3634c4861573c6e3ca9bda481ddcf62ebc05ba49458478c5c8e14
-
SSDEEP
3072:mqp2cKm5DI/OQf6B6E8wervMLN78FWY6uGKq0FA11:m8la5aF4jMLh85Ab
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Deletes itself 1 IoCs
pid Process 2956 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3060 biudfw.exe -
Loads dropped DLL 1 IoCs
pid Process 2948 NEAS.1729d58ca7e1bbfa82e145ba2ae33840.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2948 wrote to memory of 3060 2948 NEAS.1729d58ca7e1bbfa82e145ba2ae33840.exe 28 PID 2948 wrote to memory of 3060 2948 NEAS.1729d58ca7e1bbfa82e145ba2ae33840.exe 28 PID 2948 wrote to memory of 3060 2948 NEAS.1729d58ca7e1bbfa82e145ba2ae33840.exe 28 PID 2948 wrote to memory of 3060 2948 NEAS.1729d58ca7e1bbfa82e145ba2ae33840.exe 28 PID 2948 wrote to memory of 2956 2948 NEAS.1729d58ca7e1bbfa82e145ba2ae33840.exe 29 PID 2948 wrote to memory of 2956 2948 NEAS.1729d58ca7e1bbfa82e145ba2ae33840.exe 29 PID 2948 wrote to memory of 2956 2948 NEAS.1729d58ca7e1bbfa82e145ba2ae33840.exe 29 PID 2948 wrote to memory of 2956 2948 NEAS.1729d58ca7e1bbfa82e145ba2ae33840.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.1729d58ca7e1bbfa82e145ba2ae33840.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.1729d58ca7e1bbfa82e145ba2ae33840.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
PID:3060
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
191KB
MD53b6d94563d020929f2bb6a2b7c731514
SHA1786eda34c66ff23f1e8587dab8d59f9136e08c72
SHA256d30673da71bfd8d1fcc804994a244cf5bc9f8be85187c1ba08fffb6dfdbc4fff
SHA512a8505f48322066a61d4cd616f2c3c8cbbaa16e24e2b76facfc6cd6eff0772cff37dcf724aec6f4331b730bc27f79a073c37fd8b96b9ac0e2d6a1f99ddb4f0dfb
-
Filesize
512B
MD5ea9f790d2dc9f84fbf3bd28090c6e940
SHA16afaa837080db5d9d7526103d6883aa97c428a92
SHA256bf54905579196278856481aae2085f7feb32001fd92ef46b11ce668a5cae74b5
SHA512abad30d9d71b7ee4540d85013c703d7da48fccca6a39f0218960be3cd500d3d65dbe28ab9418080f131c89e8b531dba3c6c0912fab60b5ad3e1a59ff82554de7
-
Filesize
284B
MD5c5efa5fc3a147c8b4c08a522c93ff8fa
SHA120cad81d2de0bc6dd8aab23e7104157a4a886a15
SHA25656b4d796d9de171f4a230a8ae9dc29337c81c9b089c8273d08f51c65975e4368
SHA512223f2bf616993f3cacc777614075c46ccbcda342e2016490a20b783fcf9c4667e080ea8bcbe7623ff1095fdc190ee1f3f1339489c0aaedf2dcc8ca4160e269d5
-
Filesize
284B
MD5c5efa5fc3a147c8b4c08a522c93ff8fa
SHA120cad81d2de0bc6dd8aab23e7104157a4a886a15
SHA25656b4d796d9de171f4a230a8ae9dc29337c81c9b089c8273d08f51c65975e4368
SHA512223f2bf616993f3cacc777614075c46ccbcda342e2016490a20b783fcf9c4667e080ea8bcbe7623ff1095fdc190ee1f3f1339489c0aaedf2dcc8ca4160e269d5
-
Filesize
191KB
MD53b6d94563d020929f2bb6a2b7c731514
SHA1786eda34c66ff23f1e8587dab8d59f9136e08c72
SHA256d30673da71bfd8d1fcc804994a244cf5bc9f8be85187c1ba08fffb6dfdbc4fff
SHA512a8505f48322066a61d4cd616f2c3c8cbbaa16e24e2b76facfc6cd6eff0772cff37dcf724aec6f4331b730bc27f79a073c37fd8b96b9ac0e2d6a1f99ddb4f0dfb