Analysis

  • max time kernel
    11s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    22/10/2023, 17:25

General

  • Target

    NEAS.a2d8d66b20110ee8e24ca7ce35d848f0.exe

  • Size

    92KB

  • MD5

    a2d8d66b20110ee8e24ca7ce35d848f0

  • SHA1

    bebfcc64e890414b3af1482f44423f0ad8dc706b

  • SHA256

    c237b777e95c36d948dc908f4176e0b36d43f5921bf707ee6aa799ebeac30d8c

  • SHA512

    f50b33db685f2963115ef1646262ae8462edad8a7af5369e1eb7267a6f94ba63fff9cfdfda59c7b4a9149a19006a5f2a869bcf524174f0727765d8390f5b38d1

  • SSDEEP

    1536:hTdbsA6zsp5dCwUKlwI/46xnuoYljXq+66DFUABABOVLefE3:/Z6GCwUKlV/42nuoYlj6+JB8M3

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Modifies registry class 9 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.a2d8d66b20110ee8e24ca7ce35d848f0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.a2d8d66b20110ee8e24ca7ce35d848f0.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Windows\SysWOW64\Nlfmbibo.exe
      C:\Windows\system32\Nlfmbibo.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      PID:2184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Nlfmbibo.exe

    Filesize

    92KB

    MD5

    f4b64ea9ad133989db1700be779db3bb

    SHA1

    c7e1c5091c600e4bc8b47891a4b56dc08dbee53e

    SHA256

    73c2b9860fca6179fa37eebb5f47ccf46fa1d5e1afbc18ce2c971e23d504b14d

    SHA512

    6521c797cc3771ff8d8b17e6fa0f86bc722cff4e78245865f3fc110b9fff9dfe07ceef861eb71a1ec42c188d1a630273996eafc11499f05ec57cd7db8ed1c4d8

  • C:\Windows\SysWOW64\Nlfmbibo.exe

    Filesize

    92KB

    MD5

    f4b64ea9ad133989db1700be779db3bb

    SHA1

    c7e1c5091c600e4bc8b47891a4b56dc08dbee53e

    SHA256

    73c2b9860fca6179fa37eebb5f47ccf46fa1d5e1afbc18ce2c971e23d504b14d

    SHA512

    6521c797cc3771ff8d8b17e6fa0f86bc722cff4e78245865f3fc110b9fff9dfe07ceef861eb71a1ec42c188d1a630273996eafc11499f05ec57cd7db8ed1c4d8

  • C:\Windows\SysWOW64\Nlfmbibo.exe

    Filesize

    92KB

    MD5

    f4b64ea9ad133989db1700be779db3bb

    SHA1

    c7e1c5091c600e4bc8b47891a4b56dc08dbee53e

    SHA256

    73c2b9860fca6179fa37eebb5f47ccf46fa1d5e1afbc18ce2c971e23d504b14d

    SHA512

    6521c797cc3771ff8d8b17e6fa0f86bc722cff4e78245865f3fc110b9fff9dfe07ceef861eb71a1ec42c188d1a630273996eafc11499f05ec57cd7db8ed1c4d8

  • \Windows\SysWOW64\Nlfmbibo.exe

    Filesize

    92KB

    MD5

    f4b64ea9ad133989db1700be779db3bb

    SHA1

    c7e1c5091c600e4bc8b47891a4b56dc08dbee53e

    SHA256

    73c2b9860fca6179fa37eebb5f47ccf46fa1d5e1afbc18ce2c971e23d504b14d

    SHA512

    6521c797cc3771ff8d8b17e6fa0f86bc722cff4e78245865f3fc110b9fff9dfe07ceef861eb71a1ec42c188d1a630273996eafc11499f05ec57cd7db8ed1c4d8

  • \Windows\SysWOW64\Nlfmbibo.exe

    Filesize

    92KB

    MD5

    f4b64ea9ad133989db1700be779db3bb

    SHA1

    c7e1c5091c600e4bc8b47891a4b56dc08dbee53e

    SHA256

    73c2b9860fca6179fa37eebb5f47ccf46fa1d5e1afbc18ce2c971e23d504b14d

    SHA512

    6521c797cc3771ff8d8b17e6fa0f86bc722cff4e78245865f3fc110b9fff9dfe07ceef861eb71a1ec42c188d1a630273996eafc11499f05ec57cd7db8ed1c4d8

  • memory/1224-0-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/1224-6-0x00000000002C0000-0x0000000000303000-memory.dmp

    Filesize

    268KB

  • memory/1224-12-0x00000000002C0000-0x0000000000303000-memory.dmp

    Filesize

    268KB

  • memory/2184-19-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB