Analysis
-
max time kernel
123s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
22/10/2023, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f7bc1fb1ee6f80d1c54dc1b5df050520.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.f7bc1fb1ee6f80d1c54dc1b5df050520.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.f7bc1fb1ee6f80d1c54dc1b5df050520.exe
-
Size
191KB
-
MD5
f7bc1fb1ee6f80d1c54dc1b5df050520
-
SHA1
fd68f9b21e085d0b751c66c5f7b1838e299d123a
-
SHA256
a04f44d9ae4cacb46b629917cb0c7ac2bf3ad237385967773c378a1194bd18fb
-
SHA512
e3d5f684ca17dd1778fdd5cdaa5ba24c9cadd27fe4b867ffd8693dd79e95bc24b0ac847b67ee6b625779dcce067f456db3ac1abfbc950ffabc4fc80c1f0ad17a
-
SSDEEP
1536:BvVte+7YkayZ+OttmxKLjWlSA8Zp5JAJjGSHoWRcd:BvVteka8+OtAcKlSRz5QHoWCd
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2112 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 2196 NEAS.f7bc1fb1ee6f80d1c54dc1b5df050520.exe 2196 NEAS.f7bc1fb1ee6f80d1c54dc1b5df050520.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\aa89ff85\aa89ff85 NEAS.f7bc1fb1ee6f80d1c54dc1b5df050520.exe File created C:\Program Files (x86)\aa89ff85\jusched.exe NEAS.f7bc1fb1ee6f80d1c54dc1b5df050520.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job NEAS.f7bc1fb1ee6f80d1c54dc1b5df050520.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2112 2196 NEAS.f7bc1fb1ee6f80d1c54dc1b5df050520.exe 28 PID 2196 wrote to memory of 2112 2196 NEAS.f7bc1fb1ee6f80d1c54dc1b5df050520.exe 28 PID 2196 wrote to memory of 2112 2196 NEAS.f7bc1fb1ee6f80d1c54dc1b5df050520.exe 28 PID 2196 wrote to memory of 2112 2196 NEAS.f7bc1fb1ee6f80d1c54dc1b5df050520.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f7bc1fb1ee6f80d1c54dc1b5df050520.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f7bc1fb1ee6f80d1c54dc1b5df050520.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\aa89ff85\jusched.exe"C:\Program Files (x86)\aa89ff85\jusched.exe"2⤵
- Executes dropped EXE
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD5209aa6c14d66621f3aa1cee03a8bf5dc
SHA10f5bce2a29d3306586934b6d846a172078ee8e66
SHA25657ef9e3c809cf3ca41782d4c7119c3ae7e43ccbb1c00d978b745677f14b82c2e
SHA5128b9fb2bcc8e8785a48d3fe212f852c2f108ef2ab20e9e2a61e9bba5857002abe9111e42411bfc573e50c126031b7ef0433bddfa357de2ca0814f7d31157b9c63
-
Filesize
191KB
MD59167cf77e1407648e29198ba940d021e
SHA1f6e6f2bc071df27925db1f6a862693467056ea6f
SHA25671800dad59fcaf92324581f67b354e4168a548a2d8aca0463d050cf330d43160
SHA5124e176c62d00b3774ccc49d73b3ea89152e84b368c304a843401e588cbb9ec557782fa9316d47992eb77b9333928cbc4d096a29d9ca345007f6b3853b6b1dc2fc
-
Filesize
191KB
MD59167cf77e1407648e29198ba940d021e
SHA1f6e6f2bc071df27925db1f6a862693467056ea6f
SHA25671800dad59fcaf92324581f67b354e4168a548a2d8aca0463d050cf330d43160
SHA5124e176c62d00b3774ccc49d73b3ea89152e84b368c304a843401e588cbb9ec557782fa9316d47992eb77b9333928cbc4d096a29d9ca345007f6b3853b6b1dc2fc
-
Filesize
191KB
MD59167cf77e1407648e29198ba940d021e
SHA1f6e6f2bc071df27925db1f6a862693467056ea6f
SHA25671800dad59fcaf92324581f67b354e4168a548a2d8aca0463d050cf330d43160
SHA5124e176c62d00b3774ccc49d73b3ea89152e84b368c304a843401e588cbb9ec557782fa9316d47992eb77b9333928cbc4d096a29d9ca345007f6b3853b6b1dc2fc
-
Filesize
191KB
MD59167cf77e1407648e29198ba940d021e
SHA1f6e6f2bc071df27925db1f6a862693467056ea6f
SHA25671800dad59fcaf92324581f67b354e4168a548a2d8aca0463d050cf330d43160
SHA5124e176c62d00b3774ccc49d73b3ea89152e84b368c304a843401e588cbb9ec557782fa9316d47992eb77b9333928cbc4d096a29d9ca345007f6b3853b6b1dc2fc