Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-10-2023 20:43
Behavioral task
behavioral1
Sample
NEAS.d430cc611d65b13714aa9038ae93ac60.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.d430cc611d65b13714aa9038ae93ac60.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.d430cc611d65b13714aa9038ae93ac60.exe
-
Size
994KB
-
MD5
d430cc611d65b13714aa9038ae93ac60
-
SHA1
d173727de2baf48ae7bfcf2f4dd2e06a7167a873
-
SHA256
309577a0f38238b9c36758c0ae71327dd04b009f0621d40ccdbeb96d96a42b34
-
SHA512
bcccd7115dea7e73a3e29aba42e0598032de5dfa36dba28b2b561ebafaeb92749b643d9b6bcb64c6b4b0c4c9d3356ce3d7dff8d754383f1e9be195d3a4002a17
-
SSDEEP
24576:rMjPJ5g9KVGrdNikfu2hBfK8ilRty5olGJsxi:mJ5gEKNikf3hBfUiWxi
Malware Config
Signatures
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 3 IoCs
resource yara_rule behavioral1/files/0x00070000000120bd-5.dat family_ammyyadmin behavioral1/files/0x00070000000120bd-8.dat family_ammyyadmin behavioral1/files/0x00070000000120bd-11.dat family_ammyyadmin -
Executes dropped EXE 1 IoCs
pid Process 2372 budha.exe -
Loads dropped DLL 1 IoCs
pid Process 2172 NEAS.d430cc611d65b13714aa9038ae93ac60.exe -
resource yara_rule behavioral1/memory/2172-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x00070000000120bd-5.dat upx behavioral1/files/0x00070000000120bd-8.dat upx behavioral1/memory/2372-10-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2172-9-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x00070000000120bd-11.dat upx behavioral1/memory/2372-14-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2372 2172 NEAS.d430cc611d65b13714aa9038ae93ac60.exe 28 PID 2172 wrote to memory of 2372 2172 NEAS.d430cc611d65b13714aa9038ae93ac60.exe 28 PID 2172 wrote to memory of 2372 2172 NEAS.d430cc611d65b13714aa9038ae93ac60.exe 28 PID 2172 wrote to memory of 2372 2172 NEAS.d430cc611d65b13714aa9038ae93ac60.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d430cc611d65b13714aa9038ae93ac60.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d430cc611d65b13714aa9038ae93ac60.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
994KB
MD528157dcfa89c0f1eb75a153c8dbbeea4
SHA1ae5590435d00ec691a61c132236c96644fcfe815
SHA2562b0b715f5f136832d2e2a8300e5314d4b5058651c94a26a14c3a277efe6784d9
SHA5129f1fb745618956b9a76f7a1ea6b3da571f2fa16735419186338cee5f75f87f27bb1625703e5e6420fe1fed0200996e885ce31744894ad0faf2e9bc7559bddb13
-
Filesize
994KB
MD528157dcfa89c0f1eb75a153c8dbbeea4
SHA1ae5590435d00ec691a61c132236c96644fcfe815
SHA2562b0b715f5f136832d2e2a8300e5314d4b5058651c94a26a14c3a277efe6784d9
SHA5129f1fb745618956b9a76f7a1ea6b3da571f2fa16735419186338cee5f75f87f27bb1625703e5e6420fe1fed0200996e885ce31744894ad0faf2e9bc7559bddb13
-
Filesize
994KB
MD528157dcfa89c0f1eb75a153c8dbbeea4
SHA1ae5590435d00ec691a61c132236c96644fcfe815
SHA2562b0b715f5f136832d2e2a8300e5314d4b5058651c94a26a14c3a277efe6784d9
SHA5129f1fb745618956b9a76f7a1ea6b3da571f2fa16735419186338cee5f75f87f27bb1625703e5e6420fe1fed0200996e885ce31744894ad0faf2e9bc7559bddb13