Analysis

  • max time kernel
    141s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    31/10/2023, 08:50

General

  • Target

    NEAS.0f929978f66fb505ee77333a748ca550.exe

  • Size

    181KB

  • MD5

    0f929978f66fb505ee77333a748ca550

  • SHA1

    83aef5af782148f617db278351337c9d73420336

  • SHA256

    9acfb28d547a7ea9056340cc9f2f9eeaccbece3dfbfbc2831a2c2126af353bd9

  • SHA512

    bd49d888f46d191ce063e2f97eb836094ccbe549c43ffa34c11a50752e9a9ca94dd882f5d87d5522ba51f0a949caa31f1ae182de32ffddfff41117bafecb32b8

  • SSDEEP

    3072:M1abGWGT2TK1dbzlF9OVtSZjCw8geIr/QAuCgNVfpxICuQsKUIZn:9bpGtfoVtScw2RCgrzItQB

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • UPX packed file 21 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 34 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies registry class 17 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.0f929978f66fb505ee77333a748ca550.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.0f929978f66fb505ee77333a748ca550.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Program Files (x86)\XKTBS.EXE
      "C:\Program Files (x86)\XKTBS.EXE"
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Enumerates connected drives
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PerfLogs\IXYF.EXE

    Filesize

    181KB

    MD5

    82c4643138bc901afc5c460cc738865b

    SHA1

    3e5834f912124866422bb7fff6ce3a64dd038114

    SHA256

    dc0d90bfd1097c95478a412750315e34b867a74c7d033b9e295f27b3093d2f2b

    SHA512

    39b86c4aa2e0a02f6da0d9b4d78426c4d026fd20ca959b8b25a41e34e57361547433293bb1e450762406d71c8f336ec2932a408e314fe9b0717ae995ab078578

  • C:\Program Files (x86)\XKTBS.EXE

    Filesize

    182KB

    MD5

    3789324de5dbe05d27abf40191acfa12

    SHA1

    46515147ed80d79c046c04f55bef88dab374565b

    SHA256

    ceb63e92f91bce0afe819583d85bd400b8dc1eaee672ff375ee798815a4011c1

    SHA512

    b695c45806ca2d7b10ff3e31c5553c3938d786a99658f423b87b69e4291fcd1be16982e2e50304144f16f5071f8ee4b02305d36dce1fca9eb13f14a5e233a47b

  • C:\Program Files (x86)\XKTBS.EXE

    Filesize

    182KB

    MD5

    3789324de5dbe05d27abf40191acfa12

    SHA1

    46515147ed80d79c046c04f55bef88dab374565b

    SHA256

    ceb63e92f91bce0afe819583d85bd400b8dc1eaee672ff375ee798815a4011c1

    SHA512

    b695c45806ca2d7b10ff3e31c5553c3938d786a99658f423b87b69e4291fcd1be16982e2e50304144f16f5071f8ee4b02305d36dce1fca9eb13f14a5e233a47b

  • \??\c:\filedebug

    Filesize

    231B

    MD5

    c67186cb947e62e9e7bff7ccdac66cd1

    SHA1

    adbc18d5c3d1bf0ce2f88509ab2659881809f35b

    SHA256

    8062201ab597475916afc5dc4e6a3b88ac9f55717aa5be58885ef6ac7c781923

    SHA512

    33fe30228d9797258a8c3342bd9e812f26577a6ddbea5b4cd28277e6afdaf43dac6506a330fe1ffe443a63a68b0ffbd82bba867bbb4777347ed5d95fe849be30

  • \Program Files (x86)\XKTBS.EXE

    Filesize

    182KB

    MD5

    3789324de5dbe05d27abf40191acfa12

    SHA1

    46515147ed80d79c046c04f55bef88dab374565b

    SHA256

    ceb63e92f91bce0afe819583d85bd400b8dc1eaee672ff375ee798815a4011c1

    SHA512

    b695c45806ca2d7b10ff3e31c5553c3938d786a99658f423b87b69e4291fcd1be16982e2e50304144f16f5071f8ee4b02305d36dce1fca9eb13f14a5e233a47b

  • \Program Files (x86)\XKTBS.EXE

    Filesize

    182KB

    MD5

    3789324de5dbe05d27abf40191acfa12

    SHA1

    46515147ed80d79c046c04f55bef88dab374565b

    SHA256

    ceb63e92f91bce0afe819583d85bd400b8dc1eaee672ff375ee798815a4011c1

    SHA512

    b695c45806ca2d7b10ff3e31c5553c3938d786a99658f423b87b69e4291fcd1be16982e2e50304144f16f5071f8ee4b02305d36dce1fca9eb13f14a5e233a47b

  • memory/1628-33-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1628-38-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1628-29-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1628-49-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1628-48-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1628-32-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1628-47-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1628-46-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1628-45-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1628-28-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1628-39-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1628-40-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1628-41-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1628-42-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1628-44-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/2696-1-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2696-26-0x00000000029A0000-0x0000000002A0E000-memory.dmp

    Filesize

    440KB

  • memory/2696-0-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/2696-31-0x00000000029A0000-0x0000000002A0E000-memory.dmp

    Filesize

    440KB

  • memory/2696-30-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB