Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
31-10-2023 08:40
Behavioral task
behavioral1
Sample
NEAS.d33e60f3d729c3d76233258601398387.exe
Resource
win7-20231023-en
General
-
Target
NEAS.d33e60f3d729c3d76233258601398387.exe
-
Size
157KB
-
MD5
d33e60f3d729c3d76233258601398387
-
SHA1
ce407014f7b07cf54076f93cae7569330069a098
-
SHA256
5bd781d69f61aefe65034c6602a9ddcfc8ca2d0b1e19c6e240126efe29994bdc
-
SHA512
f6a4b02717916f5c86206ae36d8d02159c3cdb88d12ca44938c7537bbc0f060aab1f6040429b24339223155a13dd168382de329f286dcbae54d4289759f37bed
-
SSDEEP
384:+BdCJAKQDuuOFZyUVpULCgDb2prxVTw24I+6Al6zKyXxKDglgTlkgUH/a7wwwp:MdCyTDcZyUpULCgodM96eyXsOf4wwwp
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2236 attrib.exe -
Deletes itself 1 IoCs
pid Process 2728 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2696 iuyhost.exe -
resource yara_rule behavioral1/memory/2232-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00060000000120bd-3.dat upx behavioral1/files/0x00060000000120bd-4.dat upx behavioral1/memory/2232-5-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2696-6-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\iuyhost.exe NEAS.d33e60f3d729c3d76233258601398387.exe File opened for modification C:\Windows\Debug\iuyhost.exe NEAS.d33e60f3d729c3d76233258601398387.exe File opened for modification C:\Windows\Debug\iuyhost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2232 NEAS.d33e60f3d729c3d76233258601398387.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2236 2232 NEAS.d33e60f3d729c3d76233258601398387.exe 28 PID 2232 wrote to memory of 2236 2232 NEAS.d33e60f3d729c3d76233258601398387.exe 28 PID 2232 wrote to memory of 2236 2232 NEAS.d33e60f3d729c3d76233258601398387.exe 28 PID 2232 wrote to memory of 2236 2232 NEAS.d33e60f3d729c3d76233258601398387.exe 28 PID 2232 wrote to memory of 2728 2232 NEAS.d33e60f3d729c3d76233258601398387.exe 31 PID 2232 wrote to memory of 2728 2232 NEAS.d33e60f3d729c3d76233258601398387.exe 31 PID 2232 wrote to memory of 2728 2232 NEAS.d33e60f3d729c3d76233258601398387.exe 31 PID 2232 wrote to memory of 2728 2232 NEAS.d33e60f3d729c3d76233258601398387.exe 31 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2236 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d33e60f3d729c3d76233258601398387.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d33e60f3d729c3d76233258601398387.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\iuyhost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:2236
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\NEASD3~1.EXE > nul2⤵
- Deletes itself
PID:2728
-
-
C:\Windows\Debug\iuyhost.exeC:\Windows\Debug\iuyhost.exe1⤵
- Executes dropped EXE
PID:2696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157KB
MD55bbd57d50ceba73a3cb8e1c4626728cf
SHA1877d5993568bc7c6da03d30dd106e59cc8a55337
SHA256c7e61a5e031cf07d696255c200e8a8ce52056e697dcc53afb5f92b9376ccab20
SHA512c6c951dc4100a79fa28cbaa1afac7aa7279e43e6594fbbbd6e41c5af35c09c0accde2c983cd5380832048ce0e5a18e6473f336e71da9d8bfed1353d605f336c9
-
Filesize
157KB
MD55bbd57d50ceba73a3cb8e1c4626728cf
SHA1877d5993568bc7c6da03d30dd106e59cc8a55337
SHA256c7e61a5e031cf07d696255c200e8a8ce52056e697dcc53afb5f92b9376ccab20
SHA512c6c951dc4100a79fa28cbaa1afac7aa7279e43e6594fbbbd6e41c5af35c09c0accde2c983cd5380832048ce0e5a18e6473f336e71da9d8bfed1353d605f336c9