Analysis
-
max time kernel
8s -
max time network
5s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
21/10/2023, 21:18
Behavioral task
behavioral1
Sample
NEAS.43724ef404d5b55547b56b4db096b170.exe
Resource
win7-20230831-en
General
-
Target
NEAS.43724ef404d5b55547b56b4db096b170.exe
-
Size
2.7MB
-
MD5
43724ef404d5b55547b56b4db096b170
-
SHA1
f4dda4eb73190e35274950d08513bd2490c72344
-
SHA256
c76761203652bae65246f24fb687aa1cccd1dafdd68f14f1c85f5f3dbb6d3a8b
-
SHA512
3abd99c86ea3a56830c997b5aecf918c3c126b73338803da2cc48b23b391673bc676a26d4334c53d004d84cae53f3519ab13279afd8835f5f474d1169ea59778
-
SSDEEP
49152:BezaTF8FcNkNdfE0pZ9ozt4wIQ56uL3pgrCEdTKUHiCGakOnfa+hQI8:BemTLkNdfE0pZrQ56utgm
Malware Config
Signatures
-
XMRig Miner payload 28 IoCs
resource yara_rule behavioral1/memory/1680-0-0x000000013F410000-0x000000013F764000-memory.dmp xmrig behavioral1/files/0x000b000000012021-6.dat xmrig behavioral1/files/0x000b000000012021-3.dat xmrig behavioral1/memory/2116-9-0x000000013FED0000-0x0000000140224000-memory.dmp xmrig behavioral1/files/0x000b000000012276-13.dat xmrig behavioral1/files/0x000b000000012276-10.dat xmrig behavioral1/files/0x002e000000016b93-19.dat xmrig behavioral1/files/0x002e000000016b93-17.dat xmrig behavioral1/memory/2596-23-0x000000013FA50000-0x000000013FDA4000-memory.dmp xmrig behavioral1/files/0x002e000000016b93-12.dat xmrig behavioral1/memory/3004-16-0x000000013F420000-0x000000013F774000-memory.dmp xmrig behavioral1/files/0x0016000000016c13-27.dat xmrig behavioral1/files/0x0016000000016c13-24.dat xmrig behavioral1/memory/2724-30-0x000000013F650000-0x000000013F9A4000-memory.dmp xmrig behavioral1/memory/1680-31-0x000000013F410000-0x000000013F764000-memory.dmp xmrig behavioral1/files/0x0007000000016cac-35.dat xmrig behavioral1/files/0x0007000000016cac-32.dat xmrig behavioral1/files/0x0007000000016cd6-40.dat xmrig behavioral1/files/0x0007000000016cd6-38.dat xmrig behavioral1/memory/2712-41-0x000000013FF10000-0x0000000140264000-memory.dmp xmrig behavioral1/memory/2780-44-0x000000013FD10000-0x0000000140064000-memory.dmp xmrig behavioral1/files/0x0007000000016cea-48.dat xmrig behavioral1/files/0x0009000000016cf0-50.dat xmrig behavioral1/files/0x0007000000016cea-45.dat xmrig behavioral1/files/0x0008000000016cfc-57.dat xmrig behavioral1/files/0x0008000000016cfc-54.dat xmrig behavioral1/files/0x0006000000016d63-66.dat xmrig behavioral1/files/0x0006000000016d63-64.dat xmrig -
Executes dropped EXE 2 IoCs
pid Process 2116 DLSUzXP.exe 3004 zFmfabl.exe -
Loads dropped DLL 2 IoCs
pid Process 1680 NEAS.43724ef404d5b55547b56b4db096b170.exe 1680 NEAS.43724ef404d5b55547b56b4db096b170.exe -
resource yara_rule behavioral1/memory/1680-0-0x000000013F410000-0x000000013F764000-memory.dmp upx behavioral1/files/0x000b000000012021-6.dat upx behavioral1/files/0x000b000000012021-3.dat upx behavioral1/memory/2116-9-0x000000013FED0000-0x0000000140224000-memory.dmp upx behavioral1/files/0x000b000000012276-13.dat upx behavioral1/files/0x000b000000012276-10.dat upx behavioral1/files/0x002e000000016b93-19.dat upx behavioral1/files/0x002e000000016b93-17.dat upx behavioral1/memory/2596-23-0x000000013FA50000-0x000000013FDA4000-memory.dmp upx behavioral1/files/0x002e000000016b93-12.dat upx behavioral1/memory/3004-16-0x000000013F420000-0x000000013F774000-memory.dmp upx behavioral1/files/0x0016000000016c13-27.dat upx behavioral1/files/0x0016000000016c13-24.dat upx behavioral1/memory/2724-30-0x000000013F650000-0x000000013F9A4000-memory.dmp upx behavioral1/memory/1680-31-0x000000013F410000-0x000000013F764000-memory.dmp upx behavioral1/files/0x0007000000016cac-35.dat upx behavioral1/files/0x0007000000016cac-32.dat upx behavioral1/files/0x0007000000016cd6-40.dat upx behavioral1/files/0x0007000000016cd6-38.dat upx behavioral1/memory/2712-41-0x000000013FF10000-0x0000000140264000-memory.dmp upx behavioral1/memory/2780-44-0x000000013FD10000-0x0000000140064000-memory.dmp upx behavioral1/files/0x0007000000016cea-48.dat upx behavioral1/files/0x0009000000016cf0-53.dat upx behavioral1/files/0x0009000000016cf0-50.dat upx behavioral1/files/0x0007000000016cea-45.dat upx behavioral1/files/0x0008000000016cfc-57.dat upx behavioral1/files/0x0008000000016cfc-54.dat upx behavioral1/files/0x0007000000016d4d-62.dat upx behavioral1/files/0x0007000000016d4d-60.dat upx behavioral1/files/0x0006000000016d63-66.dat upx behavioral1/files/0x0006000000016d63-64.dat upx behavioral1/files/0x0006000000016d6e-72.dat upx behavioral1/files/0x0006000000016d6e-70.dat upx behavioral1/memory/2776-81-0x000000013FA60000-0x000000013FDB4000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\System\DLSUzXP.exe NEAS.43724ef404d5b55547b56b4db096b170.exe File created C:\Windows\System\zFmfabl.exe NEAS.43724ef404d5b55547b56b4db096b170.exe File created C:\Windows\System\SBnGSal.exe NEAS.43724ef404d5b55547b56b4db096b170.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2116 1680 NEAS.43724ef404d5b55547b56b4db096b170.exe 29 PID 1680 wrote to memory of 2116 1680 NEAS.43724ef404d5b55547b56b4db096b170.exe 29 PID 1680 wrote to memory of 2116 1680 NEAS.43724ef404d5b55547b56b4db096b170.exe 29 PID 1680 wrote to memory of 3004 1680 NEAS.43724ef404d5b55547b56b4db096b170.exe 30 PID 1680 wrote to memory of 3004 1680 NEAS.43724ef404d5b55547b56b4db096b170.exe 30 PID 1680 wrote to memory of 3004 1680 NEAS.43724ef404d5b55547b56b4db096b170.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.43724ef404d5b55547b56b4db096b170.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.43724ef404d5b55547b56b4db096b170.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\System\DLSUzXP.exeC:\Windows\System\DLSUzXP.exe2⤵
- Executes dropped EXE
PID:2116
-
-
C:\Windows\System\zFmfabl.exeC:\Windows\System\zFmfabl.exe2⤵
- Executes dropped EXE
PID:3004
-
-
C:\Windows\System\SBnGSal.exeC:\Windows\System\SBnGSal.exe2⤵PID:2596
-
-
C:\Windows\System\DlPUSvO.exeC:\Windows\System\DlPUSvO.exe2⤵PID:2724
-
-
C:\Windows\System\rYEjjWr.exeC:\Windows\System\rYEjjWr.exe2⤵PID:2712
-
-
C:\Windows\System\JPBwBMm.exeC:\Windows\System\JPBwBMm.exe2⤵PID:2780
-
-
C:\Windows\System\gosQJSc.exeC:\Windows\System\gosQJSc.exe2⤵PID:2524
-
-
C:\Windows\System\pXcsiRh.exeC:\Windows\System\pXcsiRh.exe2⤵PID:2776
-
-
C:\Windows\System\TgAKEXR.exeC:\Windows\System\TgAKEXR.exe2⤵PID:1044
-
-
C:\Windows\System\BSunoCC.exeC:\Windows\System\BSunoCC.exe2⤵PID:2536
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
704KB
MD527f1ae58c0e7ea96c463a8f0329d13e3
SHA1a5352f33f2a7ec676e07aa36bd587f2a910b1502
SHA256570ef729e78067f9e824a09ee84a0b44c24671dfe07947eaca970f453f235334
SHA51251c2e61154a9cf7b8c51728bee23d084e40467a64fc74544ed07917de5c42cd2c4f093dc4dba57e475be140334b7f9d2f8c2784d353f9bec4fe5fc6098f5ad70
-
Filesize
2.7MB
MD5b4e52de6eb597a145fc7926c861e77fc
SHA15b1e822d26f675af8425efc7067bb7c2830ff682
SHA2568f4444ed3d64271f54f3ddfffc72613d4ef7ec13c7eb57b2a1b58ea906c1fb20
SHA512fe917ef6525237a586f7a572c9008d5ace9ed9ab2f3ca40c5391d678595548973d8adb8e0aadb140cc3e60b01c1dbb5e14b61815e8952e7c5ef755b6050b730d
-
Filesize
2.2MB
MD538d41e03df3d368d11595cd6e0027235
SHA178401b5d7682a270e326bde2e4240ed5ce311408
SHA256d3bd5c03bc06f16b6f906106cbf05fddd8d03e4a444134116c6749a65560ad48
SHA512680efa0d909adbe6a4a16a70eb9cfcced2e6618a4b83235555be8244fe16cb76fc7c38d3cc89865b4f24f19c7ef998c3784c9266d162d1cc10fbaa36ea96733b
-
Filesize
832KB
MD5fe23d8f2a683ea3c37e211db5c47c198
SHA1c8d98757080f758fa71fe2947f967f4c2ba26b77
SHA256e791fb8dbe7f5a7d384dc32653c49cf355982fbc2394ea1e3030cd6ebb798cb8
SHA512ff5ab31bffe4dcd555455f3d81b2d9fca6cd687b604f37f4aa99e780677c84919321fd43b5fd13f9cb6081978b182fef58c2564f773d39cf2fefe33142ce3656
-
Filesize
2.3MB
MD59146dca6f0f6a148e95c6166944211bb
SHA1889bac8c1918930fd7ec69ad576084b3d5b68ba2
SHA256bf60ff82b0c2cb38c76ba63538e5d31029bb0c6da728dcaa1a1dce678cd8a4f8
SHA512ad88aa36027bdbeee04e716660bfaa139da85fd425b60f4fc4e5d2f83ac8744e4443c12516fb83c40f33ecb7b4655d129bf8896efe857a75e594654b29e0b264
-
Filesize
2.7MB
MD5575e94eaa2ec16488c646a8f9c70124f
SHA12332feae186446c257f58978885a9d4ff583ef4e
SHA25640490685dea02e6f3f5d7824add2e104e7f4f8b263fb070d8855143280abc66d
SHA512b8c13befed583bd1feca29ce2a3d226cad4a374dec7c540eaf4575a21aac66fe04850de8c60dd2623c6e6929506be74f6453b81040a69effaa45594dd13d13f3
-
Filesize
192KB
MD54a486a2a371d8db348dc0ad03e9fd9f0
SHA1edd912c5d606628022dc3216eaf2db7c93554ff7
SHA25693ebf2ea35e05e71e9c9884bcb76799c1b9f2b81bf8decfe1ec83807b911916b
SHA512deb1d7cb48c961fa18e748db8dfc9769c6fcedd4b7a26b044181e535fbdb31d7ead7b8ae69fab463473bcf0bbda0affdeecb9deffc51a89c74001f68a98bf60b
-
Filesize
1.2MB
MD594f63e1f7419a9647b1839d044c3f3a9
SHA1c46c80535d83ee3af00bfacc567cc954efad004c
SHA256510a38568eff170d5206eadcbd4cd2b5c6d189532ddae5b4a6b4e1b1b9b78081
SHA5123c1eef8ef3d2404113ac4e686b6b82f278158b32b3aad1f89836c3d9199f8ce6c28978dc570bca0db1c11c37a9d1416aef863ee683289050aec97010f12ddbd3
-
Filesize
1.1MB
MD53b11b6e286058a350462f1881ffc13b0
SHA1078ada47b5f6240626cef7f2c3c4019ff8ed75e5
SHA2569a484aff833f02ba960094334ea6971d8bc39770bb94fa239d8fdaf266479ee6
SHA512e0c9122598caa0a556f3e314d7a17d40ee648d54571be10f641894fd094f2652cf175ca6cdadbe2fdb959d8d780f238a397c41a8d2b26d7b9f129b19ea03795e
-
Filesize
512KB
MD56b5887af4274a78686a788865765637c
SHA15afc15e6fcbc11377bbabbda47ff43f6ebedd369
SHA256ecdfed9bc02368fefbebe0d02090e93826b7e5cc1043e339dd245299c8b23006
SHA5124f563e539f8ec68bbc27d4cc59c42ea4897bb131085e08433f745cc558ab7a030701a601ddb711cda19dfa6cd9086b458fb74762092be15aaa4190c05134d077
-
Filesize
2.0MB
MD5a74f5bf2929851888d1856b16c555fb5
SHA1071127a43a46dc38c0d4e3173a8bc56dc8d71289
SHA2567ec7d2612e0b9e00a3203098c605eecd41595356097d1fa862c6abef8366ec60
SHA51261c18cf64e93becb4d953773b2dd3fa320933e7682758135fe63db6f67ca9c08d95a3dabd88d09df8b878a43ea6bfba8d2da22aaf46847e6fc165e851b914ad3
-
Filesize
2.6MB
MD5c238bb05edaa7531fca439803b40fbf2
SHA193a9ece1312f693cc09245b51b11d0d4abbb80c7
SHA2566172acaea1baa61a3c7b24bdb597607d269178291733184303b42f181ccb7d9b
SHA512c4229e8e2f8da39b60bd8d14b84c14412f42c80ad6f811b2fb857df773b0636fd86f4dc8ffd3468bb8e90a91d9074508f892d528424e9c359163a17df9985923
-
Filesize
64KB
MD551e4020b90426a266032ae5bcb74e5b3
SHA1242fa8dc7d05d7b78f629fe2652627274810a122
SHA2565984cb4794a67b4fd33c39a8582f294030d387db17fdb4933391142fb7f614c6
SHA5125acda5a7b0ce962164cbb0c2fe75fb43a2d35d269fbb33e0eda06f3daf5a3cc37b11c0b76c58b3b3846604a879813821c87b0ead541065090905bfc897125758
-
Filesize
960KB
MD5180ec18cff675908ea09fb02b8edeae7
SHA1908a0fde6e66598e819044f800d2fb12a2c2d5e4
SHA25635e0571c2720559fc2e392ef1ac01a4890a7f5a52de790fe0560ba1ddb8b0978
SHA512f4efca4f8c80307ac309f06271cca1b553bd93330b442aaa71749f3ce5f3d47dab778dbee66162c088762bb8f4726a65ed8e5313f9bd8da09d951b910b9f8e49
-
Filesize
2.7MB
MD5b4e52de6eb597a145fc7926c861e77fc
SHA15b1e822d26f675af8425efc7067bb7c2830ff682
SHA2568f4444ed3d64271f54f3ddfffc72613d4ef7ec13c7eb57b2a1b58ea906c1fb20
SHA512fe917ef6525237a586f7a572c9008d5ace9ed9ab2f3ca40c5391d678595548973d8adb8e0aadb140cc3e60b01c1dbb5e14b61815e8952e7c5ef755b6050b730d
-
Filesize
1.9MB
MD5df6fa0c7b1eb3e84b38895974bd8e527
SHA19e85ee382a60d121e8c0943cf7fc1cbb90e92c7f
SHA2569436d605bdbe657b894e825f21be3446e32d4c084efa5b84b8bf0e16c6fbb427
SHA512739528a1941eff1774dca330a8b3dc63b08e86b01436e522548c0fbdc95370ea3a3dd68186b9b6d7d242e0fdc551f72bc664add4f3b9df6e93f24d21e4646f86
-
Filesize
1.6MB
MD531c7f621e0bf1e6567d047f50114e62b
SHA17215c0ef332f8e4c44141816bd3de1d53fde2b77
SHA2569290534365ecea2bf6929757bbed9f5341d8346512aa611f1ad7f7428fbe00c7
SHA512841afa70d7f82559292be56039ffd3938bfa5dcc3896411acbf1f425da928831bbc8b64019894721473f3aaa6dcb302e8aa8e7469ebd3d5e6956ce515d8619a4
-
Filesize
2.7MB
MD5575e94eaa2ec16488c646a8f9c70124f
SHA12332feae186446c257f58978885a9d4ff583ef4e
SHA25640490685dea02e6f3f5d7824add2e104e7f4f8b263fb070d8855143280abc66d
SHA512b8c13befed583bd1feca29ce2a3d226cad4a374dec7c540eaf4575a21aac66fe04850de8c60dd2623c6e6929506be74f6453b81040a69effaa45594dd13d13f3
-
Filesize
192KB
MD54a486a2a371d8db348dc0ad03e9fd9f0
SHA1edd912c5d606628022dc3216eaf2db7c93554ff7
SHA25693ebf2ea35e05e71e9c9884bcb76799c1b9f2b81bf8decfe1ec83807b911916b
SHA512deb1d7cb48c961fa18e748db8dfc9769c6fcedd4b7a26b044181e535fbdb31d7ead7b8ae69fab463473bcf0bbda0affdeecb9deffc51a89c74001f68a98bf60b
-
Filesize
1.2MB
MD594f63e1f7419a9647b1839d044c3f3a9
SHA1c46c80535d83ee3af00bfacc567cc954efad004c
SHA256510a38568eff170d5206eadcbd4cd2b5c6d189532ddae5b4a6b4e1b1b9b78081
SHA5123c1eef8ef3d2404113ac4e686b6b82f278158b32b3aad1f89836c3d9199f8ce6c28978dc570bca0db1c11c37a9d1416aef863ee683289050aec97010f12ddbd3
-
Filesize
1024KB
MD5dfcbc37e4ec394240ef0950246d743b6
SHA1246acf04c73722b5f80c93b3f7a14a7e6ef9426d
SHA2566ac0af0fc5fb6f4c2428c35bb10a2a1ccd7628da335e01cbb42d129908341a21
SHA5125e8e700370b9f4961a10f2ca2a5798e6132a3d1e154b716dbe96c6c06fe757bdc52717b52074a0a34375fae185f5600b1cc68a7336870cca9a1c637d37de6004
-
Filesize
704KB
MD527f1ae58c0e7ea96c463a8f0329d13e3
SHA1a5352f33f2a7ec676e07aa36bd587f2a910b1502
SHA256570ef729e78067f9e824a09ee84a0b44c24671dfe07947eaca970f453f235334
SHA51251c2e61154a9cf7b8c51728bee23d084e40467a64fc74544ed07917de5c42cd2c4f093dc4dba57e475be140334b7f9d2f8c2784d353f9bec4fe5fc6098f5ad70
-
Filesize
1.9MB
MD5df6fa0c7b1eb3e84b38895974bd8e527
SHA19e85ee382a60d121e8c0943cf7fc1cbb90e92c7f
SHA2569436d605bdbe657b894e825f21be3446e32d4c084efa5b84b8bf0e16c6fbb427
SHA512739528a1941eff1774dca330a8b3dc63b08e86b01436e522548c0fbdc95370ea3a3dd68186b9b6d7d242e0fdc551f72bc664add4f3b9df6e93f24d21e4646f86
-
Filesize
2.7MB
MD5a46f93afc84419acd8a5bfbf09cdb3af
SHA1ac6ef95481c4050f7dca9cde5aa5cf865c4758b9
SHA25608662315c1c0789f8fa21dc346983d36b30834a8d43a68336e3f7d60df8d3f6a
SHA512ab132126f115eda4b75d7e2a094ec824deeacbe4cda009f7770a661531ad7dffa6768287adb588f43e99570edea4f2ca129415f9423b0f395520faf125f6f1cf
-
Filesize
192KB
MD54a486a2a371d8db348dc0ad03e9fd9f0
SHA1edd912c5d606628022dc3216eaf2db7c93554ff7
SHA25693ebf2ea35e05e71e9c9884bcb76799c1b9f2b81bf8decfe1ec83807b911916b
SHA512deb1d7cb48c961fa18e748db8dfc9769c6fcedd4b7a26b044181e535fbdb31d7ead7b8ae69fab463473bcf0bbda0affdeecb9deffc51a89c74001f68a98bf60b