Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16/10/2023, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.8ca005d9d07dce0e185e75e31d806c80.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.8ca005d9d07dce0e185e75e31d806c80.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.8ca005d9d07dce0e185e75e31d806c80.exe
-
Size
907KB
-
MD5
8ca005d9d07dce0e185e75e31d806c80
-
SHA1
b67a9af1cc85219baea5dc863409e08ecf32410e
-
SHA256
176ac9e78137fc10db9ae5683549e4c2c95b8f27a6931c1b5537acfcc68d4cd4
-
SHA512
b0c486b624c2fedabf4d2209d3de6bd7b10cc5c0410e1ef131234b7bb46f614f256de721a37d39ba865059ff44a90d3d63c8c92c8ca812731db3913145f4bab5
-
SSDEEP
12288:P1/aGLDCMNpNAkoSzZWD8ayX2MQCw7D0FoWxJpcEi0/3IWV//7cSdj+XBnp/1lPM:P1/aGLDCM4D8ayGMZo8/2zTPE8cnzz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2156 uebibg.exe -
Loads dropped DLL 2 IoCs
pid Process 3064 NEAS.8ca005d9d07dce0e185e75e31d806c80.exe 3064 NEAS.8ca005d9d07dce0e185e75e31d806c80.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\uebibg.exe" uebibg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2156 3064 NEAS.8ca005d9d07dce0e185e75e31d806c80.exe 29 PID 3064 wrote to memory of 2156 3064 NEAS.8ca005d9d07dce0e185e75e31d806c80.exe 29 PID 3064 wrote to memory of 2156 3064 NEAS.8ca005d9d07dce0e185e75e31d806c80.exe 29 PID 3064 wrote to memory of 2156 3064 NEAS.8ca005d9d07dce0e185e75e31d806c80.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.8ca005d9d07dce0e185e75e31d806c80.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.8ca005d9d07dce0e185e75e31d806c80.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\ProgramData\uebibg.exe"C:\ProgramData\uebibg.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD595422d6a2342638f9b5c3e35f08e27f0
SHA1728abca0662fff39aef9bd1dd27ad948e3140e3d
SHA256517b0aa775cbd6cb33a1ad0275e3b174f18cd69ee4f112e5d17db573bf292318
SHA512931440b18c8f036204ee655548cc61c50d43955c69dd56e8b29365f5ca33831742ec827d9b5ba4770f183971a4b47690c32a6a790f45ad9c622a11d1780a2bcc
-
Filesize
477KB
MD570d6cb7dd01ebd5a21af02945d2ae12f
SHA105260b3e17a221e66b58d1e5ed1d0f518392159a
SHA256136fb79a4b868976a011043345fbef2cb088dd799757ec3970480eb99d9f2e92
SHA512b2c4c5b6bc5519ebb8e701c37eb298f6bdbb89b09bbf93a4f5c7a0e5b809b7bb3a6355087797e5064c1cc67a1555cbdab782fcba2f8a9d0f18d4f53337a34ea9
-
Filesize
477KB
MD570d6cb7dd01ebd5a21af02945d2ae12f
SHA105260b3e17a221e66b58d1e5ed1d0f518392159a
SHA256136fb79a4b868976a011043345fbef2cb088dd799757ec3970480eb99d9f2e92
SHA512b2c4c5b6bc5519ebb8e701c37eb298f6bdbb89b09bbf93a4f5c7a0e5b809b7bb3a6355087797e5064c1cc67a1555cbdab782fcba2f8a9d0f18d4f53337a34ea9
-
Filesize
429KB
MD56a12b055ca754e835b920cce139cebb0
SHA13d9ace492cf730b6ffe3c848c4d603cec742b0d7
SHA2562e0ae3de819c63f8f8e21f32fb4c54606c1172607ba9a9d843dc080205fe2c2a
SHA51287973fbdee99fbb1a754276d24aa0050ffdb419a346d6aadf0585b195e7948b913659a16a8f7309a7118a93e8846ab04da89ab4d501bae5ec87af9d53947e178
-
Filesize
429KB
MD56a12b055ca754e835b920cce139cebb0
SHA13d9ace492cf730b6ffe3c848c4d603cec742b0d7
SHA2562e0ae3de819c63f8f8e21f32fb4c54606c1172607ba9a9d843dc080205fe2c2a
SHA51287973fbdee99fbb1a754276d24aa0050ffdb419a346d6aadf0585b195e7948b913659a16a8f7309a7118a93e8846ab04da89ab4d501bae5ec87af9d53947e178
-
Filesize
429KB
MD56a12b055ca754e835b920cce139cebb0
SHA13d9ace492cf730b6ffe3c848c4d603cec742b0d7
SHA2562e0ae3de819c63f8f8e21f32fb4c54606c1172607ba9a9d843dc080205fe2c2a
SHA51287973fbdee99fbb1a754276d24aa0050ffdb419a346d6aadf0585b195e7948b913659a16a8f7309a7118a93e8846ab04da89ab4d501bae5ec87af9d53947e178
-
Filesize
429KB
MD56a12b055ca754e835b920cce139cebb0
SHA13d9ace492cf730b6ffe3c848c4d603cec742b0d7
SHA2562e0ae3de819c63f8f8e21f32fb4c54606c1172607ba9a9d843dc080205fe2c2a
SHA51287973fbdee99fbb1a754276d24aa0050ffdb419a346d6aadf0585b195e7948b913659a16a8f7309a7118a93e8846ab04da89ab4d501bae5ec87af9d53947e178
-
Filesize
429KB
MD56a12b055ca754e835b920cce139cebb0
SHA13d9ace492cf730b6ffe3c848c4d603cec742b0d7
SHA2562e0ae3de819c63f8f8e21f32fb4c54606c1172607ba9a9d843dc080205fe2c2a
SHA51287973fbdee99fbb1a754276d24aa0050ffdb419a346d6aadf0585b195e7948b913659a16a8f7309a7118a93e8846ab04da89ab4d501bae5ec87af9d53947e178