Analysis

  • max time kernel
    153s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-10-2023 17:53

General

  • Target

    NEAS.45cb27d06b9376380492b77fd8ee09b0.exe

  • Size

    160KB

  • MD5

    45cb27d06b9376380492b77fd8ee09b0

  • SHA1

    a2a83ddb748012716abd8b4a6549255f55699c5d

  • SHA256

    2cf2e7ec166d7ac3cf27f56c11e9c29003048ec5328668f7f3415254786f2c8b

  • SHA512

    e338c45d37d101c5d39ecc759d4d601b3fe43692412ddf0439c031715faeb210780e767c780aa20cc4192787ec323d5101ecac7e27f211d629078d547a8c3ad9

  • SSDEEP

    3072:tq4e7qiyqBpKlsl/EuaeTWzSfWERN0kEy:thfqB0lsGuaexWE7

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Stops running service(s) 3 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 6 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: LoadsDriver 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.45cb27d06b9376380492b77fd8ee09b0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.45cb27d06b9376380492b77fd8ee09b0.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Windows\SysWOW64\system.exe
      C:\Windows\system32\system.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:3004
      • C:\Windows\SysWOW64\Rundll32.exe
        Rundll32 C:\Windows\system32\dodrqgaa.dll Exucute
        3⤵
        • Checks computer location settings
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:544
        • C:\Windows\SysWOW64\net.exe
          net stop WinDefend
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3172
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop WinDefend
            5⤵
              PID:2956
          • C:\Windows\SysWOW64\net.exe
            net stop MpsSvc
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3452
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop MpsSvc
              5⤵
                PID:4952
            • C:\Windows\SysWOW64\sc.exe
              sc config MpsSvc start= disabled
              4⤵
              • Launches sc.exe
              PID:4056
            • C:\Windows\SysWOW64\sc.exe
              sc config WinDefend start= disabled
              4⤵
              • Launches sc.exe
              PID:212
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" stop PolicyAgent
              4⤵
              • Launches sc.exe
              PID:4904
          • C:\Windows\SysWOW64\Rundll32.exe
            Rundll32 C:\Windows\system32\juvsqgaa.dll Exucute
            3⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Adds Run key to start application
            • Enumerates connected drives
            • Suspicious behavior: EnumeratesProcesses
            PID:4692
        • C:\Users\Admin\AppData\Local\Temp\NEAS.45cb27d06b9376380492b77fd8ee09b0.exe
          C:\Users\Admin\AppData\Local\Temp\NEAS.45cb27d06b9376380492b77fd8ee09b0.exe
          2⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1684
          • C:\Windows\SysWOW64\Rundll32.exe
            C:\Windows\System32\Rundll32.exe "C:\Windows\Fonts\fhmho.fon",MyKILLEntry
            3⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            PID:3720
          • C:\Windows\SysWOW64\SysAnti.exe
            C:\Windows\System32\SysAnti.exe -One
            3⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4452
            • C:\Windows\SysWOW64\Rundll32.exe
              C:\Windows\System32\Rundll32.exe "C:\Windows\Fonts\uuxgt.fon",MyKILLEntry
              4⤵
              • Loads dropped DLL
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              PID:2888
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c erase /F "C:\Windows\SysWOW64\SysAnti.exe" > nul
              4⤵
                PID:1840
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c erase /F "C:\Users\Admin\AppData\Local\Temp\NEAS.45cb27d06b9376380492b77fd8ee09b0.exe" > nul
              3⤵
                PID:2084

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\EBD7.tmp

            Filesize

            4.3MB

            MD5

            6c7cdd25c2cb0073306eb22aebfc663f

            SHA1

            a1eba8ab49272b9852fe6a543677e8af36271248

            SHA256

            58280e3572333f97a7cf9f33e8d31dc26a98b6535965ebd0bde82249fc9bf705

            SHA512

            17344e07b9e9b2cd6ae4237d7f310732462f9cbb8656883607d7a1a4090e869265f92a6da1718dee50b1375b91583de60c6bd9e7e8db6b6e45e33f4b894365d6

          • C:\Users\Admin\AppData\Local\Temp\NEAS.45cb27d06b9376380492b77fd8ee09b0.exe

            Filesize

            79KB

            MD5

            b91accf0f927d437b255566c6b3eb5df

            SHA1

            185d9e4a786fa9d6a60883b336e1877a6e11c185

            SHA256

            cdafea25748623b86d6c3f06c9b72df646aa5f4f3c1bfea4eb2c715efee107f0

            SHA512

            6adaa6c8e7789a3f226863bb6e6f60918dde416f44ed185ef91fdf3a6a58f76e1d365ad724538e30fde3a90aa99988e731d051fd63dd6951a593d9c1e5f5cea9

          • C:\Users\Admin\AppData\Local\Temp\NEAS.45cb27d06b9376380492b77fd8ee09b0.exe

            Filesize

            79KB

            MD5

            b91accf0f927d437b255566c6b3eb5df

            SHA1

            185d9e4a786fa9d6a60883b336e1877a6e11c185

            SHA256

            cdafea25748623b86d6c3f06c9b72df646aa5f4f3c1bfea4eb2c715efee107f0

            SHA512

            6adaa6c8e7789a3f226863bb6e6f60918dde416f44ed185ef91fdf3a6a58f76e1d365ad724538e30fde3a90aa99988e731d051fd63dd6951a593d9c1e5f5cea9

          • C:\Windows\Fonts\fhmho.fon

            Filesize

            14KB

            MD5

            a836888d36eecb9ca38a911dabeba5ca

            SHA1

            c3a670a20ecab8d569806523f83f43803ae5014a

            SHA256

            91390cef41c95a31c3b0539b8735ae4023b93ebca993f055d38c036138f3ca38

            SHA512

            dfaed46e3178982587b4b23445cbdd62e54359d296d10e2ce7c4deed3f754d5b9996bbc959a9c1ee07ae1a360bac2e81f8707155c94a83cb5fb80b7ea850c0cd

          • C:\Windows\Fonts\fhmho.fon

            Filesize

            14KB

            MD5

            a836888d36eecb9ca38a911dabeba5ca

            SHA1

            c3a670a20ecab8d569806523f83f43803ae5014a

            SHA256

            91390cef41c95a31c3b0539b8735ae4023b93ebca993f055d38c036138f3ca38

            SHA512

            dfaed46e3178982587b4b23445cbdd62e54359d296d10e2ce7c4deed3f754d5b9996bbc959a9c1ee07ae1a360bac2e81f8707155c94a83cb5fb80b7ea850c0cd

          • C:\Windows\Fonts\uuxgt.fon

            Filesize

            14KB

            MD5

            a836888d36eecb9ca38a911dabeba5ca

            SHA1

            c3a670a20ecab8d569806523f83f43803ae5014a

            SHA256

            91390cef41c95a31c3b0539b8735ae4023b93ebca993f055d38c036138f3ca38

            SHA512

            dfaed46e3178982587b4b23445cbdd62e54359d296d10e2ce7c4deed3f754d5b9996bbc959a9c1ee07ae1a360bac2e81f8707155c94a83cb5fb80b7ea850c0cd

          • C:\Windows\Fonts\uuxgt.fon

            Filesize

            14KB

            MD5

            a836888d36eecb9ca38a911dabeba5ca

            SHA1

            c3a670a20ecab8d569806523f83f43803ae5014a

            SHA256

            91390cef41c95a31c3b0539b8735ae4023b93ebca993f055d38c036138f3ca38

            SHA512

            dfaed46e3178982587b4b23445cbdd62e54359d296d10e2ce7c4deed3f754d5b9996bbc959a9c1ee07ae1a360bac2e81f8707155c94a83cb5fb80b7ea850c0cd

          • C:\Windows\Fonts\uuxgt.fon

            Filesize

            14KB

            MD5

            a836888d36eecb9ca38a911dabeba5ca

            SHA1

            c3a670a20ecab8d569806523f83f43803ae5014a

            SHA256

            91390cef41c95a31c3b0539b8735ae4023b93ebca993f055d38c036138f3ca38

            SHA512

            dfaed46e3178982587b4b23445cbdd62e54359d296d10e2ce7c4deed3f754d5b9996bbc959a9c1ee07ae1a360bac2e81f8707155c94a83cb5fb80b7ea850c0cd

          • C:\Windows\SysWOW64\SysAnti.exe

            Filesize

            79KB

            MD5

            b91accf0f927d437b255566c6b3eb5df

            SHA1

            185d9e4a786fa9d6a60883b336e1877a6e11c185

            SHA256

            cdafea25748623b86d6c3f06c9b72df646aa5f4f3c1bfea4eb2c715efee107f0

            SHA512

            6adaa6c8e7789a3f226863bb6e6f60918dde416f44ed185ef91fdf3a6a58f76e1d365ad724538e30fde3a90aa99988e731d051fd63dd6951a593d9c1e5f5cea9

          • C:\Windows\SysWOW64\SysAnti.exe

            Filesize

            79KB

            MD5

            b91accf0f927d437b255566c6b3eb5df

            SHA1

            185d9e4a786fa9d6a60883b336e1877a6e11c185

            SHA256

            cdafea25748623b86d6c3f06c9b72df646aa5f4f3c1bfea4eb2c715efee107f0

            SHA512

            6adaa6c8e7789a3f226863bb6e6f60918dde416f44ed185ef91fdf3a6a58f76e1d365ad724538e30fde3a90aa99988e731d051fd63dd6951a593d9c1e5f5cea9

          • C:\Windows\SysWOW64\SysAnti.exe

            Filesize

            79KB

            MD5

            b91accf0f927d437b255566c6b3eb5df

            SHA1

            185d9e4a786fa9d6a60883b336e1877a6e11c185

            SHA256

            cdafea25748623b86d6c3f06c9b72df646aa5f4f3c1bfea4eb2c715efee107f0

            SHA512

            6adaa6c8e7789a3f226863bb6e6f60918dde416f44ed185ef91fdf3a6a58f76e1d365ad724538e30fde3a90aa99988e731d051fd63dd6951a593d9c1e5f5cea9

          • C:\Windows\SysWOW64\dodrqgaa.dll

            Filesize

            53KB

            MD5

            0baa38e2752bb772c8d112af86d697fb

            SHA1

            5e54ef25a9617d7976ab831ec82058f8e0f242c6

            SHA256

            8157fe871cbf84650a45083a633f9e31e4cf69ef5042fc22c20aa58830f53739

            SHA512

            9dbe331da27b0199137fa11002bcd694d8aa7ae094aa4eea58bd4286267a660ff902d553f3cc70a9e74e704362ff640c438e14e831fc190b8dd126fae0ad2356

          • C:\Windows\SysWOW64\dodrqgaa.dll

            Filesize

            53KB

            MD5

            0baa38e2752bb772c8d112af86d697fb

            SHA1

            5e54ef25a9617d7976ab831ec82058f8e0f242c6

            SHA256

            8157fe871cbf84650a45083a633f9e31e4cf69ef5042fc22c20aa58830f53739

            SHA512

            9dbe331da27b0199137fa11002bcd694d8aa7ae094aa4eea58bd4286267a660ff902d553f3cc70a9e74e704362ff640c438e14e831fc190b8dd126fae0ad2356

          • C:\Windows\SysWOW64\juvsqgaa.dll

            Filesize

            19KB

            MD5

            d4ee2c10bb3884a52f6c5ddec4fe3d63

            SHA1

            1ce33c2da2c18dfa5b4058f94d093ae11c5a725f

            SHA256

            22427cc7bb3a348df2aa7ef36bb30b885b1384408d1e7c7efbe4bdb7d7359e84

            SHA512

            e87897f61d4669c631c49171711aea35f90e580a189266dfaaddd4ed0ce3f05896b050f427d996cd2ba7c4eb7c43ea57e764abf586ab656ad45a966c2ab4718f

          • C:\Windows\SysWOW64\juvsqgaa.dll

            Filesize

            19KB

            MD5

            d4ee2c10bb3884a52f6c5ddec4fe3d63

            SHA1

            1ce33c2da2c18dfa5b4058f94d093ae11c5a725f

            SHA256

            22427cc7bb3a348df2aa7ef36bb30b885b1384408d1e7c7efbe4bdb7d7359e84

            SHA512

            e87897f61d4669c631c49171711aea35f90e580a189266dfaaddd4ed0ce3f05896b050f427d996cd2ba7c4eb7c43ea57e764abf586ab656ad45a966c2ab4718f

          • C:\Windows\SysWOW64\system.exe

            Filesize

            77KB

            MD5

            2e954e35e85de2c202583084586afb53

            SHA1

            4568766f703045ed6e600f0890eef5d48b570179

            SHA256

            9936283e53143e085d9a6d5b0652873b90c58f455881914617d42668d5a65170

            SHA512

            579d44b9920bbb21ba149d7a75bd1e7c452d13e1effcbd4a716ef55cd32bb7ddbda456155ea9c9683f046a3bd00f164db1d315971a23ea2905ccd3ff51dd359c

          • C:\Windows\SysWOW64\system.exe

            Filesize

            77KB

            MD5

            2e954e35e85de2c202583084586afb53

            SHA1

            4568766f703045ed6e600f0890eef5d48b570179

            SHA256

            9936283e53143e085d9a6d5b0652873b90c58f455881914617d42668d5a65170

            SHA512

            579d44b9920bbb21ba149d7a75bd1e7c452d13e1effcbd4a716ef55cd32bb7ddbda456155ea9c9683f046a3bd00f164db1d315971a23ea2905ccd3ff51dd359c

          • memory/1684-45-0x0000000000400000-0x0000000000419000-memory.dmp

            Filesize

            100KB

          • memory/2420-46-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/2420-0-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/2888-39-0x0000000001F30000-0x0000000001F49000-memory.dmp

            Filesize

            100KB

          • memory/2888-38-0x0000000001F30000-0x0000000001F49000-memory.dmp

            Filesize

            100KB

          • memory/2888-43-0x0000000001F30000-0x0000000001F49000-memory.dmp

            Filesize

            100KB

          • memory/3720-25-0x0000000000400000-0x0000000000419000-memory.dmp

            Filesize

            100KB

          • memory/3720-21-0x0000000000400000-0x0000000000419000-memory.dmp

            Filesize

            100KB

          • memory/4452-44-0x0000000000400000-0x0000000000419000-memory.dmp

            Filesize

            100KB