Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16-10-2023 18:34
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.b75e4c8ce41053926c4b5f75c17fb050.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.b75e4c8ce41053926c4b5f75c17fb050.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.b75e4c8ce41053926c4b5f75c17fb050.exe
-
Size
208KB
-
MD5
b75e4c8ce41053926c4b5f75c17fb050
-
SHA1
379faf67b12d8daf795cc45aadccbee24ddec4f9
-
SHA256
38b91ed970f0d7442b795afca8fdc73ce3844f0ddb4a1d339c35f04bcde59929
-
SHA512
611c9744ebf8ce8dee96856cbe5bed51b7304b1ebd45509f4ecb9abbecf8df2c3836c94c051e294f7fcb1838c5251f020bb6033784a285c5422fdfb06df7480e
-
SSDEEP
3072:DusxPityuHe6N7XjtA+VXlbRCOMeH1ITAue5VtFNyFN24NLthEjQT6j:Gtyu+WXjlXhwRYvdNyKQEj1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 604 YJO.exe -
Loads dropped DLL 2 IoCs
pid Process 796 cmd.exe 796 cmd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\windows\system\YJO.exe NEAS.b75e4c8ce41053926c4b5f75c17fb050.exe File created C:\windows\system\YJO.exe.bat NEAS.b75e4c8ce41053926c4b5f75c17fb050.exe File created C:\windows\system\YJO.exe NEAS.b75e4c8ce41053926c4b5f75c17fb050.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2200 NEAS.b75e4c8ce41053926c4b5f75c17fb050.exe 604 YJO.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2200 NEAS.b75e4c8ce41053926c4b5f75c17fb050.exe 2200 NEAS.b75e4c8ce41053926c4b5f75c17fb050.exe 604 YJO.exe 604 YJO.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2200 wrote to memory of 796 2200 NEAS.b75e4c8ce41053926c4b5f75c17fb050.exe 28 PID 2200 wrote to memory of 796 2200 NEAS.b75e4c8ce41053926c4b5f75c17fb050.exe 28 PID 2200 wrote to memory of 796 2200 NEAS.b75e4c8ce41053926c4b5f75c17fb050.exe 28 PID 2200 wrote to memory of 796 2200 NEAS.b75e4c8ce41053926c4b5f75c17fb050.exe 28 PID 796 wrote to memory of 604 796 cmd.exe 30 PID 796 wrote to memory of 604 796 cmd.exe 30 PID 796 wrote to memory of 604 796 cmd.exe 30 PID 796 wrote to memory of 604 796 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.b75e4c8ce41053926c4b5f75c17fb050.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.b75e4c8ce41053926c4b5f75c17fb050.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\system\YJO.exe.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:796 -
C:\windows\system\YJO.exeC:\windows\system\YJO.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:604
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD5690e7a98fb6224222fce9045df7c91a3
SHA14630fd75bd85a172b79b1a3690c442d5ac58b894
SHA256421da9a745d5a8888897ef5a30442a6d3d4f6cfac17919df4a89f74dfefd3b60
SHA512bfc3c360329fe8c50285af364f0933539fc14111a0532a986518d54e5ac4be46e1c3949558eda9cf031f5bbea5d129dc23e9abae20340b6c69d76f8f997c84b7
-
Filesize
66B
MD58963271b7f1508383ab854381fa824e4
SHA1ec493171dde45ffdc9e7fe8ae89a89f967c20728
SHA2561705b574170bcd9b8379e2fffb24736abd3a9c69117baa74236ab3041efcdadd
SHA512f69992ea19581312c7c6a404ff429aa78d15f2224982e1e05ab06f20279876708bd082b3e9202e5132ccc9e61db686c3ca9956ebd9e05f88236e7feaf9d67c3e
-
Filesize
208KB
MD5690e7a98fb6224222fce9045df7c91a3
SHA14630fd75bd85a172b79b1a3690c442d5ac58b894
SHA256421da9a745d5a8888897ef5a30442a6d3d4f6cfac17919df4a89f74dfefd3b60
SHA512bfc3c360329fe8c50285af364f0933539fc14111a0532a986518d54e5ac4be46e1c3949558eda9cf031f5bbea5d129dc23e9abae20340b6c69d76f8f997c84b7
-
Filesize
66B
MD58963271b7f1508383ab854381fa824e4
SHA1ec493171dde45ffdc9e7fe8ae89a89f967c20728
SHA2561705b574170bcd9b8379e2fffb24736abd3a9c69117baa74236ab3041efcdadd
SHA512f69992ea19581312c7c6a404ff429aa78d15f2224982e1e05ab06f20279876708bd082b3e9202e5132ccc9e61db686c3ca9956ebd9e05f88236e7feaf9d67c3e
-
Filesize
208KB
MD5690e7a98fb6224222fce9045df7c91a3
SHA14630fd75bd85a172b79b1a3690c442d5ac58b894
SHA256421da9a745d5a8888897ef5a30442a6d3d4f6cfac17919df4a89f74dfefd3b60
SHA512bfc3c360329fe8c50285af364f0933539fc14111a0532a986518d54e5ac4be46e1c3949558eda9cf031f5bbea5d129dc23e9abae20340b6c69d76f8f997c84b7
-
Filesize
208KB
MD5690e7a98fb6224222fce9045df7c91a3
SHA14630fd75bd85a172b79b1a3690c442d5ac58b894
SHA256421da9a745d5a8888897ef5a30442a6d3d4f6cfac17919df4a89f74dfefd3b60
SHA512bfc3c360329fe8c50285af364f0933539fc14111a0532a986518d54e5ac4be46e1c3949558eda9cf031f5bbea5d129dc23e9abae20340b6c69d76f8f997c84b7