Analysis
-
max time kernel
151s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14-10-2023 17:53
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.4ac825866a867d48f68ddd9616ed9c40.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.4ac825866a867d48f68ddd9616ed9c40.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.4ac825866a867d48f68ddd9616ed9c40.exe
-
Size
40KB
-
MD5
4ac825866a867d48f68ddd9616ed9c40
-
SHA1
6f22340079febfd0e4c4a1d5c587945ef5d7c474
-
SHA256
1b75ed7c0f2087bb1dab75310a0010da86c52be41034163a3ff357ac1cc6eaa9
-
SHA512
e38fb6743704a88f5e2e304036878ef34ec65ff4775a29130853a5f4833e073d3dbc1cb196f3b4615f275b4c207edc13b10be20640eea8e937d107edda871226
-
SSDEEP
768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGpebVIYLHA3KxK:o1KhxqwtdgI2MyzNORQtOflIwoHNV2Xf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2176 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 2108 NEAS.4ac825866a867d48f68ddd9616ed9c40.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2108 NEAS.4ac825866a867d48f68ddd9616ed9c40.exe 2176 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2176 2108 NEAS.4ac825866a867d48f68ddd9616ed9c40.exe 28 PID 2108 wrote to memory of 2176 2108 NEAS.4ac825866a867d48f68ddd9616ed9c40.exe 28 PID 2108 wrote to memory of 2176 2108 NEAS.4ac825866a867d48f68ddd9616ed9c40.exe 28 PID 2108 wrote to memory of 2176 2108 NEAS.4ac825866a867d48f68ddd9616ed9c40.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.4ac825866a867d48f68ddd9616ed9c40.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.4ac825866a867d48f68ddd9616ed9c40.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD561cccba21d5de83a70e4b88acf022d93
SHA146852ba5626e3ccbb05ed26ac3a4b8d05e72e08a
SHA256aba052a51d8a75b94906e81878e2d27e6ff23e29a85af7cbcba9a688bb848e8d
SHA512d8f9ec73a1d1ee980c73f014b0aa1135e51da25128c59a28f6eb13ca59eb5a36a73435d116ae10411ded09838c006837ebe33276f7bd1a9bdf1fd257c045f567
-
Filesize
40KB
MD561cccba21d5de83a70e4b88acf022d93
SHA146852ba5626e3ccbb05ed26ac3a4b8d05e72e08a
SHA256aba052a51d8a75b94906e81878e2d27e6ff23e29a85af7cbcba9a688bb848e8d
SHA512d8f9ec73a1d1ee980c73f014b0aa1135e51da25128c59a28f6eb13ca59eb5a36a73435d116ae10411ded09838c006837ebe33276f7bd1a9bdf1fd257c045f567
-
Filesize
40KB
MD561cccba21d5de83a70e4b88acf022d93
SHA146852ba5626e3ccbb05ed26ac3a4b8d05e72e08a
SHA256aba052a51d8a75b94906e81878e2d27e6ff23e29a85af7cbcba9a688bb848e8d
SHA512d8f9ec73a1d1ee980c73f014b0aa1135e51da25128c59a28f6eb13ca59eb5a36a73435d116ae10411ded09838c006837ebe33276f7bd1a9bdf1fd257c045f567