Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 10:11
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.052b72b2430cc11ea5808fabca8057a0_JC.exe
Resource
win7-20230831-en
General
-
Target
NEAS.052b72b2430cc11ea5808fabca8057a0_JC.exe
-
Size
320KB
-
MD5
052b72b2430cc11ea5808fabca8057a0
-
SHA1
9d25e7396c093b783647c15cd5ae9d0402499e76
-
SHA256
f27fe47674baa074682184abacef5581279610f58efb35d7a4042856bfda759c
-
SHA512
a16ba1261430aaad705594f2670ea9ed14a4946376fc69bb11185043116bff96bb5cb08f86f43d7e4cdafeb12a137237a47dc8c37cebc34b6a99056321bc3b75
-
SSDEEP
6144:sY4zSop9m06QbGTCnTRoOIH3FPA7AthtLpp:PkXpd6jqiOIHZAA
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Deletes itself 1 IoCs
pid Process 3008 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 1532 feezt.exe 1704 ecnony.exe 2108 xuudx.exe -
Loads dropped DLL 3 IoCs
pid Process 2232 NEAS.052b72b2430cc11ea5808fabca8057a0_JC.exe 1532 feezt.exe 1704 ecnony.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe 2108 xuudx.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1532 2232 NEAS.052b72b2430cc11ea5808fabca8057a0_JC.exe 28 PID 2232 wrote to memory of 1532 2232 NEAS.052b72b2430cc11ea5808fabca8057a0_JC.exe 28 PID 2232 wrote to memory of 1532 2232 NEAS.052b72b2430cc11ea5808fabca8057a0_JC.exe 28 PID 2232 wrote to memory of 1532 2232 NEAS.052b72b2430cc11ea5808fabca8057a0_JC.exe 28 PID 2232 wrote to memory of 3008 2232 NEAS.052b72b2430cc11ea5808fabca8057a0_JC.exe 30 PID 2232 wrote to memory of 3008 2232 NEAS.052b72b2430cc11ea5808fabca8057a0_JC.exe 30 PID 2232 wrote to memory of 3008 2232 NEAS.052b72b2430cc11ea5808fabca8057a0_JC.exe 30 PID 2232 wrote to memory of 3008 2232 NEAS.052b72b2430cc11ea5808fabca8057a0_JC.exe 30 PID 1532 wrote to memory of 1704 1532 feezt.exe 31 PID 1532 wrote to memory of 1704 1532 feezt.exe 31 PID 1532 wrote to memory of 1704 1532 feezt.exe 31 PID 1532 wrote to memory of 1704 1532 feezt.exe 31 PID 1704 wrote to memory of 2108 1704 ecnony.exe 36 PID 1704 wrote to memory of 2108 1704 ecnony.exe 36 PID 1704 wrote to memory of 2108 1704 ecnony.exe 36 PID 1704 wrote to memory of 2108 1704 ecnony.exe 36 PID 1704 wrote to memory of 564 1704 ecnony.exe 34 PID 1704 wrote to memory of 564 1704 ecnony.exe 34 PID 1704 wrote to memory of 564 1704 ecnony.exe 34 PID 1704 wrote to memory of 564 1704 ecnony.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.052b72b2430cc11ea5808fabca8057a0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.052b72b2430cc11ea5808fabca8057a0_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\feezt.exe"C:\Users\Admin\AppData\Local\Temp\feezt.exe" hi2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\ecnony.exe"C:\Users\Admin\AppData\Local\Temp\ecnony.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:564
-
-
C:\Users\Admin\AppData\Local\Temp\xuudx.exe"C:\Users\Admin\AppData\Local\Temp\xuudx.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
292B
MD5a16ec5e804e37c0193883f87c71a2490
SHA1353f9d01168eca28e9817faead14c9d9f39a9b30
SHA2565f744f9dd70f906e0d9f78182c3d522c26cf73974f285b1fae072f20b8241efd
SHA512351442ffda53fae9c827ac3accc3ecf99fed11b875a6634abfcb9a96e7f9688b601bb5a399b7523aa7d67b81350254c66f352d07536cd3db43ec35a7fd61f305
-
Filesize
292B
MD5a16ec5e804e37c0193883f87c71a2490
SHA1353f9d01168eca28e9817faead14c9d9f39a9b30
SHA2565f744f9dd70f906e0d9f78182c3d522c26cf73974f285b1fae072f20b8241efd
SHA512351442ffda53fae9c827ac3accc3ecf99fed11b875a6634abfcb9a96e7f9688b601bb5a399b7523aa7d67b81350254c66f352d07536cd3db43ec35a7fd61f305
-
Filesize
224B
MD55c6387681a6dfc16fb1037295561e301
SHA19afa6333feb4a0aa0dce9ef214e45e3904246c89
SHA25657143106b75c1fcf206336ab18297323ed4ee81284b889a38713c0d5dbbc2217
SHA512a26d3c2966d80cf5349a57c96d0c65141512ff63b16680bb0f780cd96f266a555583ce5db63bc8fcff64c89772a85619c36ae524f89fe78da51983da8d6a2e58
-
Filesize
224B
MD55c6387681a6dfc16fb1037295561e301
SHA19afa6333feb4a0aa0dce9ef214e45e3904246c89
SHA25657143106b75c1fcf206336ab18297323ed4ee81284b889a38713c0d5dbbc2217
SHA512a26d3c2966d80cf5349a57c96d0c65141512ff63b16680bb0f780cd96f266a555583ce5db63bc8fcff64c89772a85619c36ae524f89fe78da51983da8d6a2e58
-
Filesize
320KB
MD54fb1c3279f0bc62f724fcabdebba6d50
SHA10110c1608ec7a246bcab32d9252f7771e65caac9
SHA25681d217358b6d528ed66c6263bbf690f0bad740a418571dd632f03fbce19fc91e
SHA5122fb11a1db5d1051298f8faee6ffbf36e46cb9e03f3a8191590589b16294bf21d09866ef0924279f86f7244328bcfc051eb19a15c32c94dc7f6001b0e9c327c74
-
Filesize
320KB
MD54fb1c3279f0bc62f724fcabdebba6d50
SHA10110c1608ec7a246bcab32d9252f7771e65caac9
SHA25681d217358b6d528ed66c6263bbf690f0bad740a418571dd632f03fbce19fc91e
SHA5122fb11a1db5d1051298f8faee6ffbf36e46cb9e03f3a8191590589b16294bf21d09866ef0924279f86f7244328bcfc051eb19a15c32c94dc7f6001b0e9c327c74
-
Filesize
320KB
MD54fb1c3279f0bc62f724fcabdebba6d50
SHA10110c1608ec7a246bcab32d9252f7771e65caac9
SHA25681d217358b6d528ed66c6263bbf690f0bad740a418571dd632f03fbce19fc91e
SHA5122fb11a1db5d1051298f8faee6ffbf36e46cb9e03f3a8191590589b16294bf21d09866ef0924279f86f7244328bcfc051eb19a15c32c94dc7f6001b0e9c327c74
-
Filesize
320KB
MD56fb0062821e024d271a7d9ca8b3ba272
SHA111b380de59c9eae5c770b1b1141af3b9d9687244
SHA25692c275f01b8d390821792ba4f45c31f735ca8fe2ffd8f7cb7357789fd5a3d4cc
SHA5122419b88ca8af23a6e16e824a660f19f56f16be6af6d346826a453748c996907bac466b9b0a3c552114432138f75253b57015e1b5f05ca29d754f167aec925add
-
Filesize
320KB
MD56fb0062821e024d271a7d9ca8b3ba272
SHA111b380de59c9eae5c770b1b1141af3b9d9687244
SHA25692c275f01b8d390821792ba4f45c31f735ca8fe2ffd8f7cb7357789fd5a3d4cc
SHA5122419b88ca8af23a6e16e824a660f19f56f16be6af6d346826a453748c996907bac466b9b0a3c552114432138f75253b57015e1b5f05ca29d754f167aec925add
-
Filesize
512B
MD5399b2ff2279b1d7348ce439e6587ba17
SHA1cee3d3744e61bbfa9b85b85c48f3fdd7aa5506d6
SHA2564760baadc63da2d5f1f77f361f4a913df43ce957303caf85ef9f00b6b6257421
SHA51244c19e944cc0ea40f7d80abb340b80201e3010241e950e5b45897644624fd523f419436eb8a69cc7a529c5c6f39ad4eef52a6b2baed1e52fa714eafd2b20aa52
-
Filesize
223KB
MD5b20f106c93f78a901aa8336ff79b3461
SHA1e68b4ef935a77996745163f5170a9f37e27ef3b7
SHA2561f9c6c0b4a08055792ab559a7bdccd157bc24cb63821569edc1fe706a6b5e02a
SHA512886eea806725f105efb83e780a0b191f90bb175097b17be952b132699ef39c01dd4144321f3ecca12b06f2d9fc50501f03fd4a68572b0b850164437bb02d8389
-
Filesize
320KB
MD54fb1c3279f0bc62f724fcabdebba6d50
SHA10110c1608ec7a246bcab32d9252f7771e65caac9
SHA25681d217358b6d528ed66c6263bbf690f0bad740a418571dd632f03fbce19fc91e
SHA5122fb11a1db5d1051298f8faee6ffbf36e46cb9e03f3a8191590589b16294bf21d09866ef0924279f86f7244328bcfc051eb19a15c32c94dc7f6001b0e9c327c74
-
Filesize
320KB
MD56fb0062821e024d271a7d9ca8b3ba272
SHA111b380de59c9eae5c770b1b1141af3b9d9687244
SHA25692c275f01b8d390821792ba4f45c31f735ca8fe2ffd8f7cb7357789fd5a3d4cc
SHA5122419b88ca8af23a6e16e824a660f19f56f16be6af6d346826a453748c996907bac466b9b0a3c552114432138f75253b57015e1b5f05ca29d754f167aec925add
-
Filesize
223KB
MD5b20f106c93f78a901aa8336ff79b3461
SHA1e68b4ef935a77996745163f5170a9f37e27ef3b7
SHA2561f9c6c0b4a08055792ab559a7bdccd157bc24cb63821569edc1fe706a6b5e02a
SHA512886eea806725f105efb83e780a0b191f90bb175097b17be952b132699ef39c01dd4144321f3ecca12b06f2d9fc50501f03fd4a68572b0b850164437bb02d8389