Analysis

  • max time kernel
    121s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    16/10/2023, 18:21

General

  • Target

    NEAS.5973e6739b0e85c8aad9306203493a50.exe

  • Size

    1.1MB

  • MD5

    5973e6739b0e85c8aad9306203493a50

  • SHA1

    7cfbbbec34d4e4399d8488b9bab7d6e26051147f

  • SHA256

    dc9a70fd56feb5fcc3e9191a74a15d0460224095a5e879ad6a97cadb2b644a7f

  • SHA512

    57f0a3511edba376004e2c86022bd6b17b155f509700f05c48d52f150c43e0549eb78911839713ad150ba9cea86c211f994f044307dd2f5106919350163ebd6a

  • SSDEEP

    24576:3T6jk4iMGL98Uy58r6TYITgFxNed0GRP1Gnq:3T6jwL9tuhTYITgF+d061Gnq

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.5973e6739b0e85c8aad9306203493a50.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.5973e6739b0e85c8aad9306203493a50.exe"
    1⤵
    • Checks whether UAC is enabled
    • Writes to the Master Boot Record (MBR)
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f5dd3664c5be9dc09b0e1ab1deff3a27

    SHA1

    e7740bb9a2181b585edb10f5e662e9011041079d

    SHA256

    22ffea6823135a1b3643707f3383fd28aaa7eca51c850f47955a72cbe4636c6a

    SHA512

    be22f0d6f913078ca1739505f06ab558a7b8630d7a333ec7819d334ea0f9ba90f7571ac530c558c3e6f158f3e9a8106438ac1e6662d1884b801b461ecf8e5774

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    95e1afdf71543de43ce3687bf8eb5298

    SHA1

    7c620d5eaf178e43e4bbcbdeb1b3136064210540

    SHA256

    e2a5d61ea57352ab3e4b7723defc96d5ae4b843ef4f440ba43b683d1b23e8c96

    SHA512

    3923ce9efe6af0d17b5e063ff0917dbe218514e0dc967ad0ff91427d0d6eb847b99e23ec2f1024f0688d66e0d378fe4fdcceae3cae7243a66b206146e0ef04f4

  • C:\Users\Admin\AppData\Local\Temp\Cab83F1.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\NEAS.5973e6739b0e85c8aad9306203493a50.ini

    Filesize

    42B

    MD5

    dd84f9e2e5df476b50c0315e415f0185

    SHA1

    0dca8b4292e5e80ec1633d792f22ef51fe25549d

    SHA256

    f91870be47d74b895b693d5ae2559484bf00f02ce6d44c89a2d63e647a2e3347

    SHA512

    e576e229f1a6a5abb4bcd901e5c5a2f9e39f292037355a4b500f9d3a914f09ab82e321cedb88f04adeb718ac94e78088649fad7ebbf1e92ba7331d90c0296427

  • C:\Users\Admin\AppData\Local\Temp\Tar8415.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Local\Temp\twcache.ini

    Filesize

    882B

    MD5

    fa2df3fc61f055bc771af9c59e42dadf

    SHA1

    398c0486f47b95a6bcadbe4811ed296f35facba9

    SHA256

    0a8687178642446113da4bf988038912d41ac07be112105674941f859863e6db

    SHA512

    d230f2ecee52c006309a0d303996cc234b43a0b098180526be759eed0e3b7842f66ad2aed56904e36153f0aac473b4d117edef5e0aa75aaead862caa90e75118

  • memory/1780-0-0x00000000043F0000-0x00000000043F2000-memory.dmp

    Filesize

    8KB

  • memory/1780-31-0x00000000719C0000-0x0000000072A22000-memory.dmp

    Filesize

    16.4MB

  • memory/1780-217-0x00000000719C0000-0x0000000072A22000-memory.dmp

    Filesize

    16.4MB