Analysis
-
max time kernel
154s -
max time network
175s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14-10-2023 19:10
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.ba79c9e20f1046a3b070e1968e53e5e0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.ba79c9e20f1046a3b070e1968e53e5e0.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.ba79c9e20f1046a3b070e1968e53e5e0.exe
-
Size
59KB
-
MD5
ba79c9e20f1046a3b070e1968e53e5e0
-
SHA1
2570c13b16ea8ada6397ac7b4bed1f19f12a7294
-
SHA256
d5d21efc4524b361fa6b9638a8b6f5232bf5b8d7d85b71346016bef8426d3957
-
SHA512
8910374dbe3fe13bcc0f97a2bd007272f7bbc6ff60796ff5f71c20101ad4410be7bae34871f0287dd42580da1091ddf2435341e04ed4b4fc7a64c015d33b74ea
-
SSDEEP
1536:NLI4qg9+Q/KMJqSsGpdNmLUIsWsdM5T233AFK:Bb/jq0LNmLUIsWsdM5T233AFK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2304 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2672 pgohost.exe -
resource yara_rule behavioral1/memory/3060-0-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral1/memory/3060-5-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral1/memory/2672-11-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral1/memory/2672-12-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral1/memory/2672-14-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral1/memory/2672-15-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral1/memory/2672-16-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral1/memory/2672-17-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral1/memory/2672-19-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral1/memory/2672-21-0x0000000010000000-0x000000001000E000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\pgohost.exe NEAS.ba79c9e20f1046a3b070e1968e53e5e0.exe File opened for modification C:\Windows\Debug\pgohost.exe NEAS.ba79c9e20f1046a3b070e1968e53e5e0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz pgohost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 pgohost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3060 NEAS.ba79c9e20f1046a3b070e1968e53e5e0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2304 3060 NEAS.ba79c9e20f1046a3b070e1968e53e5e0.exe 30 PID 3060 wrote to memory of 2304 3060 NEAS.ba79c9e20f1046a3b070e1968e53e5e0.exe 30 PID 3060 wrote to memory of 2304 3060 NEAS.ba79c9e20f1046a3b070e1968e53e5e0.exe 30 PID 3060 wrote to memory of 2304 3060 NEAS.ba79c9e20f1046a3b070e1968e53e5e0.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.ba79c9e20f1046a3b070e1968e53e5e0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.ba79c9e20f1046a3b070e1968e53e5e0.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\NEASBA~1.EXE > nul2⤵
- Deletes itself
PID:2304
-
-
C:\Windows\Debug\pgohost.exeC:\Windows\Debug\pgohost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5e2574ad126ca646de4fc357e13c1ab0f
SHA145fb02a9493188b940dd7a545452d8ee356ea78b
SHA25641891a87c2ed16ee69a6b6bbe1d6f649aee410f2d7149cb30c69a40143d4ebbd
SHA5120c08e5e8c6b6709fed8712c51ae277398bcc95ec721643b2770460bebf073db065352b4ea9a971914e8f77b7158562b37f9f2f2277b4a314931c27daf7549c2a
-
Filesize
59KB
MD5e2574ad126ca646de4fc357e13c1ab0f
SHA145fb02a9493188b940dd7a545452d8ee356ea78b
SHA25641891a87c2ed16ee69a6b6bbe1d6f649aee410f2d7149cb30c69a40143d4ebbd
SHA5120c08e5e8c6b6709fed8712c51ae277398bcc95ec721643b2770460bebf073db065352b4ea9a971914e8f77b7158562b37f9f2f2277b4a314931c27daf7549c2a