Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    21/10/2023, 21:13

General

  • Target

    NEAS.0b60c4cc3a5e09713b0b83cadce54c90.exe

  • Size

    31KB

  • MD5

    0b60c4cc3a5e09713b0b83cadce54c90

  • SHA1

    a01c6e990480c755a6e8321f25fe73307f0e70d8

  • SHA256

    020c78680cc2aa9f2ea5caf799f2a78db207592e647b26f3c877224235ba2e5a

  • SHA512

    ee391bf264a86e19c776029b244f4b1852e10c19c05ef9b3953b3eb2bb2f7f3a998b8e642a4b8cc0eabd2cff54c1b33e182245a7e3c35d955510d83c418da3a2

  • SSDEEP

    768:tQbuQRy2UjmUndnlTttxDn+3jiSkjRY6AB7kKfYoJ+ifBEewzwr:QuQRylaUDTDxDXjy6AB7koYy24r

Malware Config

Signatures

  • Windows security bypass 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 4 IoCs
  • Modifies WinLogon 2 TTPs 5 IoCs
  • Drops file in System32 directory 17 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:420
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1192
        • C:\Users\Admin\AppData\Local\Temp\NEAS.0b60c4cc3a5e09713b0b83cadce54c90.exe
          "C:\Users\Admin\AppData\Local\Temp\NEAS.0b60c4cc3a5e09713b0b83cadce54c90.exe"
          2⤵
          • Loads dropped DLL
          • Drops file in System32 directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2564
          • C:\Windows\SysWOW64\uvlugot-eaceab.exe
            "C:\Windows\system32\uvlugot-eaceab.exe"
            3⤵
            • Windows security bypass
            • Modifies Installed Components in the registry
            • Sets file execution options in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Modifies WinLogon
            • Drops file in System32 directory
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1700
            • C:\Windows\SysWOW64\uvlugot-eaceab.exe
              --k33p
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:2840

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\akmanoob-ecac.exe

        Filesize

        33KB

        MD5

        f0a7728e844d5bac394ebb64e052889c

        SHA1

        0b1b129015532507262327814a1260cf31f7cacb

        SHA256

        b3d9d19d04f15a26ee82c18cbcecb2cba9b76c2e6982198928c796ed50eb19a0

        SHA512

        25a1d33ad446f678dc9f84a18e1d7e24813da528c282655d6813477cc450d3b8baef9adefbf06558f28c78bacf5ac86a9d9b504c229ce2d608a4efad4249b6cc

      • C:\Windows\SysWOW64\eatticab.dll

        Filesize

        5KB

        MD5

        c8521a5fdd1c9387d536f599d850b195

        SHA1

        a543080665107b7e32bcc1ed19dbfbc1d2931356

        SHA256

        fa8f77b6daf775d66de9d27c1d896168a792057358e518c00e72b8964b966ca5

        SHA512

        541500e2cd502852a007d29badc1a1848d187245f78ec272281bab290cc6e308f0ae6d1b96863e0c30a176b16c6cf7e63e08a8de81a84615e4710e7164a805cd

      • C:\Windows\SysWOW64\outxetop.exe

        Filesize

        34KB

        MD5

        426f73a8963624758ec89c4c828e1589

        SHA1

        4049444c747cbdb9861708d01912d5c18e87d050

        SHA256

        3de144fff2811f4f8e047d3146476f8a4b21632355b73e3d5cddab512d4ef63c

        SHA512

        63b4d35ae022f0bce07b3fa4842264e43fe4a49c975cc9f8f222321aa83931b5fcffe259f58258e8b8969ba4a052e76e06290e0d72f04a63bde3f8dd09b0e262

      • C:\Windows\SysWOW64\uvlugot-eaceab.exe

        Filesize

        31KB

        MD5

        0b60c4cc3a5e09713b0b83cadce54c90

        SHA1

        a01c6e990480c755a6e8321f25fe73307f0e70d8

        SHA256

        020c78680cc2aa9f2ea5caf799f2a78db207592e647b26f3c877224235ba2e5a

        SHA512

        ee391bf264a86e19c776029b244f4b1852e10c19c05ef9b3953b3eb2bb2f7f3a998b8e642a4b8cc0eabd2cff54c1b33e182245a7e3c35d955510d83c418da3a2

      • C:\Windows\SysWOW64\uvlugot-eaceab.exe

        Filesize

        31KB

        MD5

        0b60c4cc3a5e09713b0b83cadce54c90

        SHA1

        a01c6e990480c755a6e8321f25fe73307f0e70d8

        SHA256

        020c78680cc2aa9f2ea5caf799f2a78db207592e647b26f3c877224235ba2e5a

        SHA512

        ee391bf264a86e19c776029b244f4b1852e10c19c05ef9b3953b3eb2bb2f7f3a998b8e642a4b8cc0eabd2cff54c1b33e182245a7e3c35d955510d83c418da3a2

      • C:\Windows\SysWOW64\uvlugot-eaceab.exe

        Filesize

        31KB

        MD5

        0b60c4cc3a5e09713b0b83cadce54c90

        SHA1

        a01c6e990480c755a6e8321f25fe73307f0e70d8

        SHA256

        020c78680cc2aa9f2ea5caf799f2a78db207592e647b26f3c877224235ba2e5a

        SHA512

        ee391bf264a86e19c776029b244f4b1852e10c19c05ef9b3953b3eb2bb2f7f3a998b8e642a4b8cc0eabd2cff54c1b33e182245a7e3c35d955510d83c418da3a2

      • C:\Windows\SysWOW64\uvlugot-eaceab.exe

        Filesize

        31KB

        MD5

        0b60c4cc3a5e09713b0b83cadce54c90

        SHA1

        a01c6e990480c755a6e8321f25fe73307f0e70d8

        SHA256

        020c78680cc2aa9f2ea5caf799f2a78db207592e647b26f3c877224235ba2e5a

        SHA512

        ee391bf264a86e19c776029b244f4b1852e10c19c05ef9b3953b3eb2bb2f7f3a998b8e642a4b8cc0eabd2cff54c1b33e182245a7e3c35d955510d83c418da3a2

      • \Windows\SysWOW64\uvlugot-eaceab.exe

        Filesize

        31KB

        MD5

        0b60c4cc3a5e09713b0b83cadce54c90

        SHA1

        a01c6e990480c755a6e8321f25fe73307f0e70d8

        SHA256

        020c78680cc2aa9f2ea5caf799f2a78db207592e647b26f3c877224235ba2e5a

        SHA512

        ee391bf264a86e19c776029b244f4b1852e10c19c05ef9b3953b3eb2bb2f7f3a998b8e642a4b8cc0eabd2cff54c1b33e182245a7e3c35d955510d83c418da3a2

      • \Windows\SysWOW64\uvlugot-eaceab.exe

        Filesize

        31KB

        MD5

        0b60c4cc3a5e09713b0b83cadce54c90

        SHA1

        a01c6e990480c755a6e8321f25fe73307f0e70d8

        SHA256

        020c78680cc2aa9f2ea5caf799f2a78db207592e647b26f3c877224235ba2e5a

        SHA512

        ee391bf264a86e19c776029b244f4b1852e10c19c05ef9b3953b3eb2bb2f7f3a998b8e642a4b8cc0eabd2cff54c1b33e182245a7e3c35d955510d83c418da3a2

      • \Windows\SysWOW64\uvlugot-eaceab.exe

        Filesize

        31KB

        MD5

        0b60c4cc3a5e09713b0b83cadce54c90

        SHA1

        a01c6e990480c755a6e8321f25fe73307f0e70d8

        SHA256

        020c78680cc2aa9f2ea5caf799f2a78db207592e647b26f3c877224235ba2e5a

        SHA512

        ee391bf264a86e19c776029b244f4b1852e10c19c05ef9b3953b3eb2bb2f7f3a998b8e642a4b8cc0eabd2cff54c1b33e182245a7e3c35d955510d83c418da3a2

      • memory/1700-22-0x0000000000400000-0x0000000000417000-memory.dmp

        Filesize

        92KB

      • memory/1700-25-0x0000000000460000-0x0000000000477000-memory.dmp

        Filesize

        92KB

      • memory/1700-54-0x0000000000400000-0x0000000000417000-memory.dmp

        Filesize

        92KB

      • memory/2564-10-0x0000000000400000-0x0000000000417000-memory.dmp

        Filesize

        92KB

      • memory/2564-11-0x00000000002B0000-0x00000000002C7000-memory.dmp

        Filesize

        92KB

      • memory/2564-0-0x0000000000400000-0x0000000000417000-memory.dmp

        Filesize

        92KB

      • memory/2840-26-0x0000000000400000-0x0000000000417000-memory.dmp

        Filesize

        92KB