Analysis

  • max time kernel
    230s
  • max time network
    54s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2023 08:19

General

  • Target

    NEAS.e20998ffe08fbe65cc318ececef98ff0.exe

  • Size

    101KB

  • MD5

    e20998ffe08fbe65cc318ececef98ff0

  • SHA1

    1fb9b377e85a0cc772461313d69a0f65a2c3fb35

  • SHA256

    59e6d48f1bf89da33d2fcb2165476cfdc8c151f7c5a3bbd9b7dcec223c4ccd0f

  • SHA512

    c160371e4980ff3952fbbd68b2b7103c8696f4925cef9fdf83dbea9c4f59c1a91c087ce6de0465132487a76a67ef7594965f14e5ec508086020b9d94ea0a4fb9

  • SSDEEP

    1536:JfgLdQAQfcfymNa2Go0VeoE4p9nV5Icq+cRXZ2N4xHuF8sQWNe5lb1PW:JftffjmNfGvE4pL4zv2NL6sRe5lxe

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.e20998ffe08fbe65cc318ececef98ff0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.e20998ffe08fbe65cc318ececef98ff0.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\$$a869D.bat
      2⤵
      • Deletes itself
      PID:3036
      • C:\Users\Admin\AppData\Local\Temp\NEAS.e20998ffe08fbe65cc318ececef98ff0.exe
        "C:\Users\Admin\AppData\Local\Temp\NEAS.e20998ffe08fbe65cc318ececef98ff0.exe"
        3⤵
        • Executes dropped EXE
        PID:3008
      • C:\Users\Admin\AppData\Local\Temp\NEAS.e20998ffe08fbe65cc318ececef98ff0.exe
        "C:\Users\Admin\AppData\Local\Temp\NEAS.e20998ffe08fbe65cc318ececef98ff0.exe"
        3⤵
        • Executes dropped EXE
        PID:1524
    • C:\Windows\Logo1_.exe
      C:\Windows\Logo1_.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Windows\SysWOW64\net.exe
        net stop "Kingsoft AntiVirus Service"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2644
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
          4⤵
            PID:1568
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1264

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\$$a869D.bat

        Filesize

        560B

        MD5

        7b67003ec1c7e5a973e9d5ca4ed4e050

        SHA1

        51b1b3a06452144bd6b5fac53134f8bbe854a983

        SHA256

        5c1693561b83af43b071b147ee257bf394c2a32578d88a616cbc78f77a074b6d

        SHA512

        393c833c2449bf7a195c6137a30e9c289763787fdfaa4065894f880ecd6786613c2579bdb89a84128f0386c8bf8a7eddfcd56042cf5b66abd619096c8e59defc

      • C:\Users\Admin\AppData\Local\Temp\$$a869D.bat

        Filesize

        560B

        MD5

        7b67003ec1c7e5a973e9d5ca4ed4e050

        SHA1

        51b1b3a06452144bd6b5fac53134f8bbe854a983

        SHA256

        5c1693561b83af43b071b147ee257bf394c2a32578d88a616cbc78f77a074b6d

        SHA512

        393c833c2449bf7a195c6137a30e9c289763787fdfaa4065894f880ecd6786613c2579bdb89a84128f0386c8bf8a7eddfcd56042cf5b66abd619096c8e59defc

      • C:\Users\Admin\AppData\Local\Temp\NEAS.e20998ffe08fbe65cc318ececef98ff0.exe

        Filesize

        75KB

        MD5

        a7851a05e83f42f741a804320c485083

        SHA1

        b76d2e6eb6d2bf289a5118c908578906851460d0

        SHA256

        3600ff58fdb37f53562e626fd74d6f4d8d39925d711a96f221bb4aca7992926a

        SHA512

        eadbfbee79aa0f34b35e0a9c9d717b3c8ac18729df8e52332b696352a2a41d0da37119ab1cb81a10bb7854b930e6479686f8fa8b5a447d48213e3c1c9304ce7b

      • C:\Users\Admin\AppData\Local\Temp\NEAS.e20998ffe08fbe65cc318ececef98ff0.exe

        Filesize

        75KB

        MD5

        a7851a05e83f42f741a804320c485083

        SHA1

        b76d2e6eb6d2bf289a5118c908578906851460d0

        SHA256

        3600ff58fdb37f53562e626fd74d6f4d8d39925d711a96f221bb4aca7992926a

        SHA512

        eadbfbee79aa0f34b35e0a9c9d717b3c8ac18729df8e52332b696352a2a41d0da37119ab1cb81a10bb7854b930e6479686f8fa8b5a447d48213e3c1c9304ce7b

      • C:\Users\Admin\AppData\Local\Temp\NEAS.e20998ffe08fbe65cc318ececef98ff0.exe.exe

        Filesize

        75KB

        MD5

        a7851a05e83f42f741a804320c485083

        SHA1

        b76d2e6eb6d2bf289a5118c908578906851460d0

        SHA256

        3600ff58fdb37f53562e626fd74d6f4d8d39925d711a96f221bb4aca7992926a

        SHA512

        eadbfbee79aa0f34b35e0a9c9d717b3c8ac18729df8e52332b696352a2a41d0da37119ab1cb81a10bb7854b930e6479686f8fa8b5a447d48213e3c1c9304ce7b

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        b029778f3ac823d7c0b7150399fb9da1

        SHA1

        f3f4b3615f75b7ff4992e41e62f7ceac37d06e11

        SHA256

        34ac708d04dc44510292d2642c1fee1d74a0c64977d79c6086c8b38f7ab34d29

        SHA512

        af256d7118bb42bf8216dab9a34078d1970d21d42ccb382208ff4f8a53f66041d11a04e687fa70b0cf4bca542b743c1f57c227aba889232c705925a79c3504a0

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        b029778f3ac823d7c0b7150399fb9da1

        SHA1

        f3f4b3615f75b7ff4992e41e62f7ceac37d06e11

        SHA256

        34ac708d04dc44510292d2642c1fee1d74a0c64977d79c6086c8b38f7ab34d29

        SHA512

        af256d7118bb42bf8216dab9a34078d1970d21d42ccb382208ff4f8a53f66041d11a04e687fa70b0cf4bca542b743c1f57c227aba889232c705925a79c3504a0

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        b029778f3ac823d7c0b7150399fb9da1

        SHA1

        f3f4b3615f75b7ff4992e41e62f7ceac37d06e11

        SHA256

        34ac708d04dc44510292d2642c1fee1d74a0c64977d79c6086c8b38f7ab34d29

        SHA512

        af256d7118bb42bf8216dab9a34078d1970d21d42ccb382208ff4f8a53f66041d11a04e687fa70b0cf4bca542b743c1f57c227aba889232c705925a79c3504a0

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        b029778f3ac823d7c0b7150399fb9da1

        SHA1

        f3f4b3615f75b7ff4992e41e62f7ceac37d06e11

        SHA256

        34ac708d04dc44510292d2642c1fee1d74a0c64977d79c6086c8b38f7ab34d29

        SHA512

        af256d7118bb42bf8216dab9a34078d1970d21d42ccb382208ff4f8a53f66041d11a04e687fa70b0cf4bca542b743c1f57c227aba889232c705925a79c3504a0

      • F:\$RECYCLE.BIN\S-1-5-21-3750544865-3773649541-1858556521-1000\_desktop.ini

        Filesize

        10B

        MD5

        b00c1a89b15effd3d1fb2de4fdc7bee5

        SHA1

        0c3a4f06bcd397d1d3a63ab2ca05e64cc7ae554d

        SHA256

        0767fccea7e57d6427b0a9b440f28687f4b835409c5dcdeb337a479009222cd9

        SHA512

        b50a3c1df331ecd7dbbd88c202c7b7b8fe6ece8df96249d88f40138952fb3c523f6f133a2d12daa2fd892643b53e4c19b39bcb16ef810f789c996e00bad03bc0

      • memory/1264-67-0x0000000002970000-0x0000000002971000-memory.dmp

        Filesize

        4KB

      • memory/2696-82-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2696-1422-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2696-24-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2696-1411-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2696-144-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2696-140-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2696-134-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2696-88-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2696-73-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2696-75-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2924-14-0x00000000003B0000-0x00000000003E4000-memory.dmp

        Filesize

        208KB

      • memory/2924-72-0x00000000003B0000-0x00000000003E4000-memory.dmp

        Filesize

        208KB

      • memory/2924-1-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2924-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2924-19-0x00000000003B0000-0x00000000003E4000-memory.dmp

        Filesize

        208KB

      • memory/2924-18-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3036-61-0x00000000024C0000-0x00000000024C1000-memory.dmp

        Filesize

        4KB