Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16-10-2023 18:25
Behavioral task
behavioral1
Sample
NEAS.779a64ef52d3a6619d6d1be3a7451740.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.779a64ef52d3a6619d6d1be3a7451740.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.779a64ef52d3a6619d6d1be3a7451740.exe
-
Size
483KB
-
MD5
779a64ef52d3a6619d6d1be3a7451740
-
SHA1
b23a8f11f29cc3aa6697c0f6401735bee5fa8b8f
-
SHA256
fa887b14f58c84418bcc69e5cb39ef76d27367c960c9d16b980ab973a017ddc8
-
SHA512
4543ec62e673535430f5a7f0d524a155a409df306465555e6ccfe9bf79396aecafeef62da66efa0239a2541e28640bcf378a850b8995a21bcb2ba24f44338712
-
SSDEEP
6144:WdspDeDrxkg/vrMuJIgwhEFHyOrJcX/Pgqwzm5IzkWjS4e4azExBKO1t4Kb70Nqr:s8kxNhOZElO5kkWjhD4AI
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2088-0-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/files/0x0007000000016d01-13.dat upx behavioral1/memory/2088-17-0x0000000000400000-0x0000000000470000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MKEM.EXE = "C:\\Program Files\\MKEM.EXE" NEAS.779a64ef52d3a6619d6d1be3a7451740.exe -
Enumerates connected drives 3 TTPs 17 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\O: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\S: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\G: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\U: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\V: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\H: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\I: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\L: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\R: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\T: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\J: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\K: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\M: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\N: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\P: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\Q: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\UUZD.EXE NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File created C:\Program Files\MKEM.EXE NEAS.779a64ef52d3a6619d6d1be3a7451740.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\BGCMNIR.EXE NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File created C:\Windows\IRYDMFE.EXE NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File created C:\Windows\BGCMNIR.EXE NEAS.779a64ef52d3a6619d6d1be3a7451740.exe -
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open\command\ = "C:\\Windows\\BGCMNIR.EXE %1" NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell\open\command\ = "C:\\PerfLogs\\MAJ.EXE %1" NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open\command NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell\open\command NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell\open NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open\command\ = "C:\\Program Files\\UUZD.EXE \"%1\"" NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open\command\ = "C:\\Windows\\BGCMNIR.EXE \"%1\" %*" NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open\command\ = "C:\\Windows\\IRYDMFE.EXE \"%1\"" NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open\command NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\System Volume Information\\FOGWKK.EXE %1" NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell NEAS.779a64ef52d3a6619d6d1be3a7451740.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.779a64ef52d3a6619d6d1be3a7451740.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.779a64ef52d3a6619d6d1be3a7451740.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
PID:2088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD5c3c62f5de8125ac3e68e49dea351febf
SHA1997813396ced62ff457535367e604e8ad4ba807b
SHA256e2e57263c207871ea269faae963c347f33ea01b180069b53919e134b1c150dc0
SHA512af8434d737a4f06d7070cf32adb3b5916747fa68279695ada107969f835551264032150259376d115769c211aeefb5a05740dd79c03ff034b0b591abe5d879e9