Analysis
-
max time kernel
126s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
22-10-2023 17:20
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.6023c18d00bb861321eff007f601ff50.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.6023c18d00bb861321eff007f601ff50.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.6023c18d00bb861321eff007f601ff50.exe
-
Size
61KB
-
MD5
6023c18d00bb861321eff007f601ff50
-
SHA1
7e4e40d58d1c6d4a96232dc3810f75e03a8e62d8
-
SHA256
b21a5d2e53e1529302d165b26e0ef1031489e906e37fbf033f3b2df0831f10d3
-
SHA512
b86698924f5d3776d5b93884c54ff68a0e737cda623917e86d2a560d9842f6834c68df86108902b6a025d3915a1857f89c4eede8442608bdb98510408eb50e39
-
SSDEEP
1536:mO6skYL5TDbCY7fjPpm7GVOFAwfUglXa:rkw517fjPQiwfRlXa
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2388 w0ssqxy.exe 2772 si7uq8ns0.exe -
Loads dropped DLL 4 IoCs
pid Process 2864 NEAS.6023c18d00bb861321eff007f601ff50.exe 2864 NEAS.6023c18d00bb861321eff007f601ff50.exe 2388 w0ssqxy.exe 2388 w0ssqxy.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3986878123-1347213090-2173403696-1000\Software\Microsoft\Windows\CurrentVersion\Run\7q7kmrtu = "C:\\Users\\Admin\\AppData\\Roaming\\w0ssqxy.exe" NEAS.6023c18d00bb861321eff007f601ff50.exe Set value (str) \REGISTRY\USER\S-1-5-21-3986878123-1347213090-2173403696-1000\Software\Microsoft\Windows\CurrentVersion\Run\amfhvc7b = "C:\\Users\\Admin\\AppData\\Roaming\\si7uq8ns0.exe" w0ssqxy.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2388 2864 NEAS.6023c18d00bb861321eff007f601ff50.exe 30 PID 2864 wrote to memory of 2388 2864 NEAS.6023c18d00bb861321eff007f601ff50.exe 30 PID 2864 wrote to memory of 2388 2864 NEAS.6023c18d00bb861321eff007f601ff50.exe 30 PID 2864 wrote to memory of 2388 2864 NEAS.6023c18d00bb861321eff007f601ff50.exe 30 PID 2388 wrote to memory of 2772 2388 w0ssqxy.exe 31 PID 2388 wrote to memory of 2772 2388 w0ssqxy.exe 31 PID 2388 wrote to memory of 2772 2388 w0ssqxy.exe 31 PID 2388 wrote to memory of 2772 2388 w0ssqxy.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6023c18d00bb861321eff007f601ff50.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6023c18d00bb861321eff007f601ff50.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Roaming\w0ssqxy.exeC:\Users\Admin\AppData\Roaming\w0ssqxy.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Roaming\si7uq8ns0.exeC:\Users\Admin\AppData\Roaming\si7uq8ns0.exe3⤵
- Executes dropped EXE
PID:2772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD54ab8b3c65d58e6f0ea74c51c0d80105e
SHA162a1c07eaa5bc93529b205b4316478f6a4270750
SHA2568921c534908c176a5f86442591fa3d0cf112efeb55a289e2019e96733ec7c1a3
SHA51208838d72fe2bbe517c41b37d726b9b3d524d5e47dedf95a68bcda3813631fa62bfaf4096859f4eefaeeb51e0808b2b700bf98efabf136b89da30dfa50ae39fae
-
Filesize
61KB
MD54ab8b3c65d58e6f0ea74c51c0d80105e
SHA162a1c07eaa5bc93529b205b4316478f6a4270750
SHA2568921c534908c176a5f86442591fa3d0cf112efeb55a289e2019e96733ec7c1a3
SHA51208838d72fe2bbe517c41b37d726b9b3d524d5e47dedf95a68bcda3813631fa62bfaf4096859f4eefaeeb51e0808b2b700bf98efabf136b89da30dfa50ae39fae
-
Filesize
61KB
MD54ab8b3c65d58e6f0ea74c51c0d80105e
SHA162a1c07eaa5bc93529b205b4316478f6a4270750
SHA2568921c534908c176a5f86442591fa3d0cf112efeb55a289e2019e96733ec7c1a3
SHA51208838d72fe2bbe517c41b37d726b9b3d524d5e47dedf95a68bcda3813631fa62bfaf4096859f4eefaeeb51e0808b2b700bf98efabf136b89da30dfa50ae39fae
-
Filesize
61KB
MD544a1f7a06b1ff282bf6821be6bc27d47
SHA19046d697104adf42a18622bb6c14f319a31b5af0
SHA256833cb00aa13c6e7cc65664c12e94ee090b859a34e68c8a8e88b80c7fc0760a97
SHA5124a6822f9d48015d749fccaaa01b3a8abeadf155f4be8fb3b90b17d6d3ef903c42f8405c548f1a037305e6b37b3c5533e7972a5cb21cab9bca1e2fc33b2ed3374
-
Filesize
61KB
MD544a1f7a06b1ff282bf6821be6bc27d47
SHA19046d697104adf42a18622bb6c14f319a31b5af0
SHA256833cb00aa13c6e7cc65664c12e94ee090b859a34e68c8a8e88b80c7fc0760a97
SHA5124a6822f9d48015d749fccaaa01b3a8abeadf155f4be8fb3b90b17d6d3ef903c42f8405c548f1a037305e6b37b3c5533e7972a5cb21cab9bca1e2fc33b2ed3374
-
Filesize
61KB
MD544a1f7a06b1ff282bf6821be6bc27d47
SHA19046d697104adf42a18622bb6c14f319a31b5af0
SHA256833cb00aa13c6e7cc65664c12e94ee090b859a34e68c8a8e88b80c7fc0760a97
SHA5124a6822f9d48015d749fccaaa01b3a8abeadf155f4be8fb3b90b17d6d3ef903c42f8405c548f1a037305e6b37b3c5533e7972a5cb21cab9bca1e2fc33b2ed3374
-
Filesize
61KB
MD54ab8b3c65d58e6f0ea74c51c0d80105e
SHA162a1c07eaa5bc93529b205b4316478f6a4270750
SHA2568921c534908c176a5f86442591fa3d0cf112efeb55a289e2019e96733ec7c1a3
SHA51208838d72fe2bbe517c41b37d726b9b3d524d5e47dedf95a68bcda3813631fa62bfaf4096859f4eefaeeb51e0808b2b700bf98efabf136b89da30dfa50ae39fae
-
Filesize
61KB
MD54ab8b3c65d58e6f0ea74c51c0d80105e
SHA162a1c07eaa5bc93529b205b4316478f6a4270750
SHA2568921c534908c176a5f86442591fa3d0cf112efeb55a289e2019e96733ec7c1a3
SHA51208838d72fe2bbe517c41b37d726b9b3d524d5e47dedf95a68bcda3813631fa62bfaf4096859f4eefaeeb51e0808b2b700bf98efabf136b89da30dfa50ae39fae
-
Filesize
61KB
MD544a1f7a06b1ff282bf6821be6bc27d47
SHA19046d697104adf42a18622bb6c14f319a31b5af0
SHA256833cb00aa13c6e7cc65664c12e94ee090b859a34e68c8a8e88b80c7fc0760a97
SHA5124a6822f9d48015d749fccaaa01b3a8abeadf155f4be8fb3b90b17d6d3ef903c42f8405c548f1a037305e6b37b3c5533e7972a5cb21cab9bca1e2fc33b2ed3374
-
Filesize
61KB
MD544a1f7a06b1ff282bf6821be6bc27d47
SHA19046d697104adf42a18622bb6c14f319a31b5af0
SHA256833cb00aa13c6e7cc65664c12e94ee090b859a34e68c8a8e88b80c7fc0760a97
SHA5124a6822f9d48015d749fccaaa01b3a8abeadf155f4be8fb3b90b17d6d3ef903c42f8405c548f1a037305e6b37b3c5533e7972a5cb21cab9bca1e2fc33b2ed3374