Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
31/10/2023, 08:50
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0b95b593846d690a5ea971b4c3e054e0.exe
Resource
win7-20231025-en
General
-
Target
NEAS.0b95b593846d690a5ea971b4c3e054e0.exe
-
Size
51KB
-
MD5
0b95b593846d690a5ea971b4c3e054e0
-
SHA1
94576410c6f2c9d4991075acb90e0270f2e6b503
-
SHA256
33413b258984ae33cb8b622bdbbeec3a572ab08e4d5fd0837fb194525c036d52
-
SHA512
d7f762d5e0bf20f4793ee20ee81752c203c0205b0a1ab06a208d56ec1635deff0edec1c972c7a03b846c1f97dc0558384d205cea15c73020e9070ec38bc5d9da
-
SSDEEP
1536:834/PC7Ruz3hRXRASULZ6JKYdbzcmhCZnUx7:It7R8fU6n8Ux7
Malware Config
Extracted
urelas
112.175.88.207
112.175.88.208
Signatures
-
Deletes itself 1 IoCs
pid Process 2772 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2428 mokdhft.exe -
Loads dropped DLL 1 IoCs
pid Process 3068 NEAS.0b95b593846d690a5ea971b4c3e054e0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2428 3068 NEAS.0b95b593846d690a5ea971b4c3e054e0.exe 28 PID 3068 wrote to memory of 2428 3068 NEAS.0b95b593846d690a5ea971b4c3e054e0.exe 28 PID 3068 wrote to memory of 2428 3068 NEAS.0b95b593846d690a5ea971b4c3e054e0.exe 28 PID 3068 wrote to memory of 2428 3068 NEAS.0b95b593846d690a5ea971b4c3e054e0.exe 28 PID 3068 wrote to memory of 2772 3068 NEAS.0b95b593846d690a5ea971b4c3e054e0.exe 29 PID 3068 wrote to memory of 2772 3068 NEAS.0b95b593846d690a5ea971b4c3e054e0.exe 29 PID 3068 wrote to memory of 2772 3068 NEAS.0b95b593846d690a5ea971b4c3e054e0.exe 29 PID 3068 wrote to memory of 2772 3068 NEAS.0b95b593846d690a5ea971b4c3e054e0.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.0b95b593846d690a5ea971b4c3e054e0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.0b95b593846d690a5ea971b4c3e054e0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\mokdhft.exe"C:\Users\Admin\AppData\Local\Temp\mokdhft.exe"2⤵
- Executes dropped EXE
PID:2428
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD539e55c2b5135dd669ad371cc03d79fc2
SHA1d027fea84a269f8e556dfb5411ac3d01b9311017
SHA256ecf7b9f0150af34b1d09f4602f0acf31445ff28e40b2411b0e32180bb8672919
SHA512e75942d900b97d254097d8a44bfde16bdc99cc0f124541316a0987b2fb5433b7b1f12d4eff8b47d05e9068e7a038e4dd92998646448dcb0d6615a81a561ef280
-
Filesize
51KB
MD5823ca07593ba37a71913e3659ac05898
SHA18ee1993947287a9f017d983d980b2215f39a23a5
SHA25603de51b54d4fb59222d89eaf8bd6751445416725d99ef621c5965813ac50ea32
SHA512e0c60cdf172c36cf2cd6a7d45e54932e0ea2d96d05a55611908de8515a3cacec6eece833fb899197971847c35fc5057fbb6d8300bfb81b9c74906f2cac699705
-
Filesize
284B
MD5dbd9f92bc16074685158ac6ccc50ba43
SHA1f50f3605c5f8287f756638da0a41fba9e9f22cbc
SHA2568a1f32ea3cd07fb47fb7543a119daabfab6b35196afa2dda59ee2fa28977070c
SHA5126e1c223f9b13440440942ae6643935ad279e0e48d38a91072ce782ca6a669a728ad3cd8c5a93aa519ed4a7b896d02aa783575a2074a5019482fd253ce5cae8f0
-
Filesize
284B
MD5dbd9f92bc16074685158ac6ccc50ba43
SHA1f50f3605c5f8287f756638da0a41fba9e9f22cbc
SHA2568a1f32ea3cd07fb47fb7543a119daabfab6b35196afa2dda59ee2fa28977070c
SHA5126e1c223f9b13440440942ae6643935ad279e0e48d38a91072ce782ca6a669a728ad3cd8c5a93aa519ed4a7b896d02aa783575a2074a5019482fd253ce5cae8f0
-
Filesize
51KB
MD5823ca07593ba37a71913e3659ac05898
SHA18ee1993947287a9f017d983d980b2215f39a23a5
SHA25603de51b54d4fb59222d89eaf8bd6751445416725d99ef621c5965813ac50ea32
SHA512e0c60cdf172c36cf2cd6a7d45e54932e0ea2d96d05a55611908de8515a3cacec6eece833fb899197971847c35fc5057fbb6d8300bfb81b9c74906f2cac699705