Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
22-10-2023 17:31
Behavioral task
behavioral1
Sample
NEAS.e5ae79491bdad7d13b42da25a61ee100.exe
Resource
win7-20231020-en
General
-
Target
NEAS.e5ae79491bdad7d13b42da25a61ee100.exe
-
Size
231KB
-
MD5
e5ae79491bdad7d13b42da25a61ee100
-
SHA1
20d4fecb9314ccb047a5a6ab4695a0fc40fa4f67
-
SHA256
ff34314a429adb6dae01697ca5ae48bfec80dcefdef39629c9eed36d65ab49c6
-
SHA512
2a6e5dbe04354735a02eef891bd97dc28905d63a073e3193a27f62c33fc361cefd48a451c3aff328d392c6350d44c1d655d89634e0e8045787edb7a50a4fb947
-
SSDEEP
3072:/YshWbz+6LPr5Qy7K65UC1O9Ro2rqYyXzCEwGNy:/YQWbS6LPeHC1O9RleYuzCEwGNy
Malware Config
Extracted
urelas
112.175.88.207
112.175.88.208
Signatures
-
Deletes itself 1 IoCs
pid Process 1440 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1632 huter.exe -
Loads dropped DLL 1 IoCs
pid Process 1228 NEAS.e5ae79491bdad7d13b42da25a61ee100.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1228 wrote to memory of 1632 1228 NEAS.e5ae79491bdad7d13b42da25a61ee100.exe 28 PID 1228 wrote to memory of 1632 1228 NEAS.e5ae79491bdad7d13b42da25a61ee100.exe 28 PID 1228 wrote to memory of 1632 1228 NEAS.e5ae79491bdad7d13b42da25a61ee100.exe 28 PID 1228 wrote to memory of 1632 1228 NEAS.e5ae79491bdad7d13b42da25a61ee100.exe 28 PID 1228 wrote to memory of 1440 1228 NEAS.e5ae79491bdad7d13b42da25a61ee100.exe 29 PID 1228 wrote to memory of 1440 1228 NEAS.e5ae79491bdad7d13b42da25a61ee100.exe 29 PID 1228 wrote to memory of 1440 1228 NEAS.e5ae79491bdad7d13b42da25a61ee100.exe 29 PID 1228 wrote to memory of 1440 1228 NEAS.e5ae79491bdad7d13b42da25a61ee100.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.e5ae79491bdad7d13b42da25a61ee100.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e5ae79491bdad7d13b42da25a61ee100.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
PID:1632
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
PID:1440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD56e0ecec5e285ac121f1bf7f3a59ce016
SHA1d432c8dd0bd3ddfffaa5a22a74c6da08172c13d7
SHA256c1df717fda579031c64433ccadbc1e471654b843121f07f4066b7793355e2dfe
SHA5129c20f07807c92a4bd1808deb68e571fd0ea26f39b6033c8f9e40c0346267aae396ba4ceac427c2daf95d855cca22f05aaeb7ad4f93bd8289972816a55d69527d
-
Filesize
231KB
MD5a28bbb62683c3d07f13802b58cba177f
SHA11f8404fc233779526bf4fb48fee9a24715750766
SHA25650186a7cb3695906915bb995784424e1480da9f548a1ef9a37312249b2f12db1
SHA512fb8a6b94b74d8f332eddbc2d6f7f317ad78a84b950a45fd193103e64f95e476aa7a2b24c13c32ec2713b394c76dacc132bc01faaba117c036d92c698b817e2d2
-
Filesize
284B
MD5a55d65d2d1ba5a81a657a51561e0d651
SHA108dd709b2bd4135b83fe79dbe600c0e713ce18e5
SHA256b8a508df6c8c34f18c0a594dd0b0df9d7f79fb7b06f838cb4067b4d608f6ce64
SHA51281f1f0b480d1cb8a52df8047ffffca46f47113eb441c4d791fb0ec11647897ff185b7993fe475688d6eb474675bce563bc666742960e3bfeedf22dfdb5ebcbdf
-
Filesize
284B
MD5a55d65d2d1ba5a81a657a51561e0d651
SHA108dd709b2bd4135b83fe79dbe600c0e713ce18e5
SHA256b8a508df6c8c34f18c0a594dd0b0df9d7f79fb7b06f838cb4067b4d608f6ce64
SHA51281f1f0b480d1cb8a52df8047ffffca46f47113eb441c4d791fb0ec11647897ff185b7993fe475688d6eb474675bce563bc666742960e3bfeedf22dfdb5ebcbdf
-
Filesize
231KB
MD5a28bbb62683c3d07f13802b58cba177f
SHA11f8404fc233779526bf4fb48fee9a24715750766
SHA25650186a7cb3695906915bb995784424e1480da9f548a1ef9a37312249b2f12db1
SHA512fb8a6b94b74d8f332eddbc2d6f7f317ad78a84b950a45fd193103e64f95e476aa7a2b24c13c32ec2713b394c76dacc132bc01faaba117c036d92c698b817e2d2