Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2023 18:37
Behavioral task
behavioral1
Sample
NEAS.c8bd8b72c98c385e2692b8d515288570.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.c8bd8b72c98c385e2692b8d515288570.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.c8bd8b72c98c385e2692b8d515288570.exe
-
Size
500KB
-
MD5
c8bd8b72c98c385e2692b8d515288570
-
SHA1
f86f39886be85a8ea6bf112cea487e92eb7a7f15
-
SHA256
74b74188693eb5890f4ac66406811ffec79eafcb9a61db2963b01ca10b36bc0b
-
SHA512
aa035d4a3df17d38f9c56fbbe29861574a65f74ecca18a78f9b8fffc219f8d42e1f92dcb46325741d315ec69a02133646f9a1c8f6499cedc41741c2a9f0c1baa
-
SSDEEP
12288:8T8M7/OfD5CsvMzNoQa7fudskfA2tp6cLUsBzvwWP7OLD:8oM/Ob8GMpobbudN1tpzLUsdwWPG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4784 UTSCSI.EXE -
Loads dropped DLL 5 IoCs
pid Process 1344 NEAS.c8bd8b72c98c385e2692b8d515288570.exe 1344 NEAS.c8bd8b72c98c385e2692b8d515288570.exe 1344 NEAS.c8bd8b72c98c385e2692b8d515288570.exe 1344 NEAS.c8bd8b72c98c385e2692b8d515288570.exe 1344 NEAS.c8bd8b72c98c385e2692b8d515288570.exe -
resource yara_rule behavioral2/memory/1344-0-0x0000000000400000-0x000000000054D000-memory.dmp upx behavioral2/memory/1344-26-0x0000000000400000-0x000000000054D000-memory.dmp upx behavioral2/memory/1344-28-0x0000000000400000-0x000000000054D000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: NEAS.c8bd8b72c98c385e2692b8d515288570.exe File opened (read-only) \??\D: NEAS.c8bd8b72c98c385e2692b8d515288570.exe File opened (read-only) \??\M: NEAS.c8bd8b72c98c385e2692b8d515288570.exe File opened (read-only) \??\N: NEAS.c8bd8b72c98c385e2692b8d515288570.exe File opened (read-only) \??\T: NEAS.c8bd8b72c98c385e2692b8d515288570.exe File opened (read-only) \??\V: NEAS.c8bd8b72c98c385e2692b8d515288570.exe File opened (read-only) \??\O: NEAS.c8bd8b72c98c385e2692b8d515288570.exe File opened (read-only) \??\R: NEAS.c8bd8b72c98c385e2692b8d515288570.exe File opened (read-only) \??\X: NEAS.c8bd8b72c98c385e2692b8d515288570.exe File opened (read-only) \??\E: NEAS.c8bd8b72c98c385e2692b8d515288570.exe File opened (read-only) \??\F: NEAS.c8bd8b72c98c385e2692b8d515288570.exe File opened (read-only) \??\H: NEAS.c8bd8b72c98c385e2692b8d515288570.exe File opened (read-only) \??\K: NEAS.c8bd8b72c98c385e2692b8d515288570.exe File opened (read-only) \??\L: NEAS.c8bd8b72c98c385e2692b8d515288570.exe File opened (read-only) \??\Y: NEAS.c8bd8b72c98c385e2692b8d515288570.exe File opened (read-only) \??\Z: NEAS.c8bd8b72c98c385e2692b8d515288570.exe File opened (read-only) \??\G: NEAS.c8bd8b72c98c385e2692b8d515288570.exe File opened (read-only) \??\J: NEAS.c8bd8b72c98c385e2692b8d515288570.exe File opened (read-only) \??\Q: NEAS.c8bd8b72c98c385e2692b8d515288570.exe File opened (read-only) \??\I: NEAS.c8bd8b72c98c385e2692b8d515288570.exe File opened (read-only) \??\P: NEAS.c8bd8b72c98c385e2692b8d515288570.exe File opened (read-only) \??\S: NEAS.c8bd8b72c98c385e2692b8d515288570.exe File opened (read-only) \??\U: NEAS.c8bd8b72c98c385e2692b8d515288570.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\UTSCSI.EXE NEAS.c8bd8b72c98c385e2692b8d515288570.exe File created C:\Windows\SysWOW64\UTSCSI.EXE NEAS.c8bd8b72c98c385e2692b8d515288570.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1344 NEAS.c8bd8b72c98c385e2692b8d515288570.exe 1344 NEAS.c8bd8b72c98c385e2692b8d515288570.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.c8bd8b72c98c385e2692b8d515288570.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.c8bd8b72c98c385e2692b8d515288570.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1344
-
C:\Windows\SysWOW64\UTSCSI.EXEC:\Windows\SysWOW64\UTSCSI.EXE1⤵
- Executes dropped EXE
PID:4784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD5b245463d28a74a95dc7d2300d4dc86b3
SHA1b70fca051994614bd65f4fc5ce547e18d2d743ba
SHA25665f35380ce93bc33a59d4a4cc9c8bc09c7836a060847048c4f8727c5a5406685
SHA512c5ffa53cd5179aa5b7b89a85a580d0967ca67a10422b5a86700f60bd25ce81fac9bfa0f3def7828337a2d3e5701861ae9b2319d7e6fb8421a288c1a9d7a50d82
-
Filesize
352KB
MD5b245463d28a74a95dc7d2300d4dc86b3
SHA1b70fca051994614bd65f4fc5ce547e18d2d743ba
SHA25665f35380ce93bc33a59d4a4cc9c8bc09c7836a060847048c4f8727c5a5406685
SHA512c5ffa53cd5179aa5b7b89a85a580d0967ca67a10422b5a86700f60bd25ce81fac9bfa0f3def7828337a2d3e5701861ae9b2319d7e6fb8421a288c1a9d7a50d82
-
Filesize
352KB
MD5b245463d28a74a95dc7d2300d4dc86b3
SHA1b70fca051994614bd65f4fc5ce547e18d2d743ba
SHA25665f35380ce93bc33a59d4a4cc9c8bc09c7836a060847048c4f8727c5a5406685
SHA512c5ffa53cd5179aa5b7b89a85a580d0967ca67a10422b5a86700f60bd25ce81fac9bfa0f3def7828337a2d3e5701861ae9b2319d7e6fb8421a288c1a9d7a50d82
-
Filesize
104KB
MD576f16faccd249018e86a7444a7c210f0
SHA14990dc0d8606bf6fd1cfd85746924760ce9b7f57
SHA2560d9edafea25f75d13e56faa217f7796eb1377102d50aab5cd2842ac89cd80282
SHA512bc6d9748c18d45c4aa10b016367c1c893dc3dfd29955ed0ecc4e18fb47c614323e43f404de3f01390c564d8b563e46c2e93e0d4724ec8bbda40b2288d46b215a
-
Filesize
104KB
MD576f16faccd249018e86a7444a7c210f0
SHA14990dc0d8606bf6fd1cfd85746924760ce9b7f57
SHA2560d9edafea25f75d13e56faa217f7796eb1377102d50aab5cd2842ac89cd80282
SHA512bc6d9748c18d45c4aa10b016367c1c893dc3dfd29955ed0ecc4e18fb47c614323e43f404de3f01390c564d8b563e46c2e93e0d4724ec8bbda40b2288d46b215a
-
Filesize
460KB
MD5e69ea9fdfb9617a76675497bb97155a0
SHA17759712f6fb0e93e9f8cb4fe0594b105c13a0f29
SHA256f6b659e773e57c50a7eee084d9dd7d86ad996740800d57c633459811428e4b60
SHA512e24ffeb3fad14215aad5fe94566b253bc1e96e5a158617eb71a625c888e9ff164b22bd0b7850bbf8f6e838e9ef29ebd8f819eb65c808e0c698bda9bdac58dd73
-
Filesize
44KB
MD58afffda081cff3057391fedbbb483601
SHA1761ef44a81a4a2fae950d5ee2b1e2808083056ee
SHA256c44ea66c31ca8a425a4289fb0e7503a37ffe121cb6f50baa474c5980e92aaef8
SHA5122d735671670397f61844e80ac64ccc6fdab5407634d87bfcc74d36641762086d6e18858feba8a6175910815ece279cfbdfabfa57adcefb7a5453c6f93b34cc65
-
Filesize
44KB
MD58afffda081cff3057391fedbbb483601
SHA1761ef44a81a4a2fae950d5ee2b1e2808083056ee
SHA256c44ea66c31ca8a425a4289fb0e7503a37ffe121cb6f50baa474c5980e92aaef8
SHA5122d735671670397f61844e80ac64ccc6fdab5407634d87bfcc74d36641762086d6e18858feba8a6175910815ece279cfbdfabfa57adcefb7a5453c6f93b34cc65