Analysis
-
max time kernel
152s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2023, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.539fea98f85b65862a2b5e6151157240.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.539fea98f85b65862a2b5e6151157240.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.539fea98f85b65862a2b5e6151157240.exe
-
Size
395KB
-
MD5
539fea98f85b65862a2b5e6151157240
-
SHA1
d2847a588271b8e849d6d49a667d4f206187aafd
-
SHA256
2fe0e1c415ab4eab43d8dd0a61c5b7aebb7fe824460a22ac7a9bb19930dcd454
-
SHA512
ad4adecdf67911b97e634e8be7f3b41f945758853e70ab18bd45d7980512e270b4059a52285cbecb5840dba068f2edeeb6d4c7f3913c2fe0bcf1120be6e3df30
-
SSDEEP
6144:4jlYKRF/LReWAsUyo3bpIP3An49fK/WHBR4NF0mHX2on:4jauDReWOFIP3A4NENF0m328
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3936 lsiunq.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\lsiunq.exe" lsiunq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4828 wrote to memory of 3936 4828 NEAS.539fea98f85b65862a2b5e6151157240.exe 85 PID 4828 wrote to memory of 3936 4828 NEAS.539fea98f85b65862a2b5e6151157240.exe 85 PID 4828 wrote to memory of 3936 4828 NEAS.539fea98f85b65862a2b5e6151157240.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.539fea98f85b65862a2b5e6151157240.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.539fea98f85b65862a2b5e6151157240.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\ProgramData\lsiunq.exe"C:\ProgramData\lsiunq.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
258KB
MD56749302779565c54eba33b6f6466b708
SHA15eea836d1a51280f965eed550cb8dae3341492db
SHA256cf91b12717032844c458a483c25714e070bef1dc1a801f17521d9c1389ff1404
SHA512daadf1bb92ab51537cc267f19dcdaffb16b771cc40753e12f692dac2f3a04c7dd5bb1131797c78040079fe9efb214b50358a63ef9f457e244fd1a71dff9199e2
-
Filesize
258KB
MD56749302779565c54eba33b6f6466b708
SHA15eea836d1a51280f965eed550cb8dae3341492db
SHA256cf91b12717032844c458a483c25714e070bef1dc1a801f17521d9c1389ff1404
SHA512daadf1bb92ab51537cc267f19dcdaffb16b771cc40753e12f692dac2f3a04c7dd5bb1131797c78040079fe9efb214b50358a63ef9f457e244fd1a71dff9199e2
-
Filesize
395KB
MD5d1da9780548414f0d1047f52d47b7dd6
SHA1162326bdecfdf72fe9860c27653828eaba763351
SHA2560ecec556128894eba6103101ff2d10d7e7152dd2e2399e3b6a465a493bb89077
SHA51276bd467e9f66fcc1ec82a40f8c43366fc4601b7358d5bfb8a83e4b047a2987bc9f672b78c24a2a413b9ef7f65a064952fda385381fa3f0236639191483ca7b9d