Analysis

  • max time kernel
    126s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    22-10-2023 17:20

General

  • Target

    NEAS.6023c18d00bb861321eff007f601ff50.exe

  • Size

    61KB

  • MD5

    6023c18d00bb861321eff007f601ff50

  • SHA1

    7e4e40d58d1c6d4a96232dc3810f75e03a8e62d8

  • SHA256

    b21a5d2e53e1529302d165b26e0ef1031489e906e37fbf033f3b2df0831f10d3

  • SHA512

    b86698924f5d3776d5b93884c54ff68a0e737cda623917e86d2a560d9842f6834c68df86108902b6a025d3915a1857f89c4eede8442608bdb98510408eb50e39

  • SSDEEP

    1536:mO6skYL5TDbCY7fjPpm7GVOFAwfUglXa:rkw517fjPQiwfRlXa

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.6023c18d00bb861321eff007f601ff50.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.6023c18d00bb861321eff007f601ff50.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Users\Admin\AppData\Roaming\w0ssqxy.exe
      C:\Users\Admin\AppData\Roaming\w0ssqxy.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2388
      • C:\Users\Admin\AppData\Roaming\si7uq8ns0.exe
        C:\Users\Admin\AppData\Roaming\si7uq8ns0.exe
        3⤵
        • Executes dropped EXE
        PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\si7uq8ns0.exe

    Filesize

    61KB

    MD5

    4ab8b3c65d58e6f0ea74c51c0d80105e

    SHA1

    62a1c07eaa5bc93529b205b4316478f6a4270750

    SHA256

    8921c534908c176a5f86442591fa3d0cf112efeb55a289e2019e96733ec7c1a3

    SHA512

    08838d72fe2bbe517c41b37d726b9b3d524d5e47dedf95a68bcda3813631fa62bfaf4096859f4eefaeeb51e0808b2b700bf98efabf136b89da30dfa50ae39fae

  • C:\Users\Admin\AppData\Roaming\si7uq8ns0.exe

    Filesize

    61KB

    MD5

    4ab8b3c65d58e6f0ea74c51c0d80105e

    SHA1

    62a1c07eaa5bc93529b205b4316478f6a4270750

    SHA256

    8921c534908c176a5f86442591fa3d0cf112efeb55a289e2019e96733ec7c1a3

    SHA512

    08838d72fe2bbe517c41b37d726b9b3d524d5e47dedf95a68bcda3813631fa62bfaf4096859f4eefaeeb51e0808b2b700bf98efabf136b89da30dfa50ae39fae

  • C:\Users\Admin\AppData\Roaming\si7uq8ns0.exe

    Filesize

    61KB

    MD5

    4ab8b3c65d58e6f0ea74c51c0d80105e

    SHA1

    62a1c07eaa5bc93529b205b4316478f6a4270750

    SHA256

    8921c534908c176a5f86442591fa3d0cf112efeb55a289e2019e96733ec7c1a3

    SHA512

    08838d72fe2bbe517c41b37d726b9b3d524d5e47dedf95a68bcda3813631fa62bfaf4096859f4eefaeeb51e0808b2b700bf98efabf136b89da30dfa50ae39fae

  • C:\Users\Admin\AppData\Roaming\w0ssqxy.exe

    Filesize

    61KB

    MD5

    44a1f7a06b1ff282bf6821be6bc27d47

    SHA1

    9046d697104adf42a18622bb6c14f319a31b5af0

    SHA256

    833cb00aa13c6e7cc65664c12e94ee090b859a34e68c8a8e88b80c7fc0760a97

    SHA512

    4a6822f9d48015d749fccaaa01b3a8abeadf155f4be8fb3b90b17d6d3ef903c42f8405c548f1a037305e6b37b3c5533e7972a5cb21cab9bca1e2fc33b2ed3374

  • C:\Users\Admin\AppData\Roaming\w0ssqxy.exe

    Filesize

    61KB

    MD5

    44a1f7a06b1ff282bf6821be6bc27d47

    SHA1

    9046d697104adf42a18622bb6c14f319a31b5af0

    SHA256

    833cb00aa13c6e7cc65664c12e94ee090b859a34e68c8a8e88b80c7fc0760a97

    SHA512

    4a6822f9d48015d749fccaaa01b3a8abeadf155f4be8fb3b90b17d6d3ef903c42f8405c548f1a037305e6b37b3c5533e7972a5cb21cab9bca1e2fc33b2ed3374

  • C:\Users\Admin\AppData\Roaming\w0ssqxy.exe

    Filesize

    61KB

    MD5

    44a1f7a06b1ff282bf6821be6bc27d47

    SHA1

    9046d697104adf42a18622bb6c14f319a31b5af0

    SHA256

    833cb00aa13c6e7cc65664c12e94ee090b859a34e68c8a8e88b80c7fc0760a97

    SHA512

    4a6822f9d48015d749fccaaa01b3a8abeadf155f4be8fb3b90b17d6d3ef903c42f8405c548f1a037305e6b37b3c5533e7972a5cb21cab9bca1e2fc33b2ed3374

  • \Users\Admin\AppData\Roaming\si7uq8ns0.exe

    Filesize

    61KB

    MD5

    4ab8b3c65d58e6f0ea74c51c0d80105e

    SHA1

    62a1c07eaa5bc93529b205b4316478f6a4270750

    SHA256

    8921c534908c176a5f86442591fa3d0cf112efeb55a289e2019e96733ec7c1a3

    SHA512

    08838d72fe2bbe517c41b37d726b9b3d524d5e47dedf95a68bcda3813631fa62bfaf4096859f4eefaeeb51e0808b2b700bf98efabf136b89da30dfa50ae39fae

  • \Users\Admin\AppData\Roaming\si7uq8ns0.exe

    Filesize

    61KB

    MD5

    4ab8b3c65d58e6f0ea74c51c0d80105e

    SHA1

    62a1c07eaa5bc93529b205b4316478f6a4270750

    SHA256

    8921c534908c176a5f86442591fa3d0cf112efeb55a289e2019e96733ec7c1a3

    SHA512

    08838d72fe2bbe517c41b37d726b9b3d524d5e47dedf95a68bcda3813631fa62bfaf4096859f4eefaeeb51e0808b2b700bf98efabf136b89da30dfa50ae39fae

  • \Users\Admin\AppData\Roaming\w0ssqxy.exe

    Filesize

    61KB

    MD5

    44a1f7a06b1ff282bf6821be6bc27d47

    SHA1

    9046d697104adf42a18622bb6c14f319a31b5af0

    SHA256

    833cb00aa13c6e7cc65664c12e94ee090b859a34e68c8a8e88b80c7fc0760a97

    SHA512

    4a6822f9d48015d749fccaaa01b3a8abeadf155f4be8fb3b90b17d6d3ef903c42f8405c548f1a037305e6b37b3c5533e7972a5cb21cab9bca1e2fc33b2ed3374

  • \Users\Admin\AppData\Roaming\w0ssqxy.exe

    Filesize

    61KB

    MD5

    44a1f7a06b1ff282bf6821be6bc27d47

    SHA1

    9046d697104adf42a18622bb6c14f319a31b5af0

    SHA256

    833cb00aa13c6e7cc65664c12e94ee090b859a34e68c8a8e88b80c7fc0760a97

    SHA512

    4a6822f9d48015d749fccaaa01b3a8abeadf155f4be8fb3b90b17d6d3ef903c42f8405c548f1a037305e6b37b3c5533e7972a5cb21cab9bca1e2fc33b2ed3374