Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
31/10/2023, 08:56
Behavioral task
behavioral1
Sample
NEAS.a4ea33709df3ce221d3be12e067f7c60.exe
Resource
win7-20231023-en
General
-
Target
NEAS.a4ea33709df3ce221d3be12e067f7c60.exe
-
Size
462KB
-
MD5
a4ea33709df3ce221d3be12e067f7c60
-
SHA1
1526904e22da7501b3cbbdaa36e3ab403606f4fe
-
SHA256
3f5922020afc585c228569bd660271d56af1a8dc9534aebf0c624b3e090b8722
-
SHA512
835a82030001ad761aa6b1099c28209fb7d3dc6cb774fce663ddd25c08de9ee5c9a34edebc21cb9ebdb4a613bb83382e1dedc881ad614b962812fe478a84a950
-
SSDEEP
6144:PEK25f5ySIcWLsxIIW4DYM6SB6mwrxcvkzmSOphmH:PMpASIcWYx2U6kQnt
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Deletes itself 1 IoCs
pid Process 2168 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2120 vitij.exe 2668 jonyru.exe 2192 iqnid.exe -
Loads dropped DLL 8 IoCs
pid Process 1788 NEAS.a4ea33709df3ce221d3be12e067f7c60.exe 2120 vitij.exe 2668 jonyru.exe 2668 jonyru.exe 484 WerFault.exe 484 WerFault.exe 484 WerFault.exe 484 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 484 2192 WerFault.exe 34 -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2120 1788 NEAS.a4ea33709df3ce221d3be12e067f7c60.exe 28 PID 1788 wrote to memory of 2120 1788 NEAS.a4ea33709df3ce221d3be12e067f7c60.exe 28 PID 1788 wrote to memory of 2120 1788 NEAS.a4ea33709df3ce221d3be12e067f7c60.exe 28 PID 1788 wrote to memory of 2120 1788 NEAS.a4ea33709df3ce221d3be12e067f7c60.exe 28 PID 1788 wrote to memory of 2168 1788 NEAS.a4ea33709df3ce221d3be12e067f7c60.exe 30 PID 1788 wrote to memory of 2168 1788 NEAS.a4ea33709df3ce221d3be12e067f7c60.exe 30 PID 1788 wrote to memory of 2168 1788 NEAS.a4ea33709df3ce221d3be12e067f7c60.exe 30 PID 1788 wrote to memory of 2168 1788 NEAS.a4ea33709df3ce221d3be12e067f7c60.exe 30 PID 2120 wrote to memory of 2668 2120 vitij.exe 31 PID 2120 wrote to memory of 2668 2120 vitij.exe 31 PID 2120 wrote to memory of 2668 2120 vitij.exe 31 PID 2120 wrote to memory of 2668 2120 vitij.exe 31 PID 2668 wrote to memory of 2192 2668 jonyru.exe 34 PID 2668 wrote to memory of 2192 2668 jonyru.exe 34 PID 2668 wrote to memory of 2192 2668 jonyru.exe 34 PID 2668 wrote to memory of 2192 2668 jonyru.exe 34 PID 2668 wrote to memory of 1092 2668 jonyru.exe 36 PID 2668 wrote to memory of 1092 2668 jonyru.exe 36 PID 2668 wrote to memory of 1092 2668 jonyru.exe 36 PID 2668 wrote to memory of 1092 2668 jonyru.exe 36 PID 2192 wrote to memory of 484 2192 iqnid.exe 37 PID 2192 wrote to memory of 484 2192 iqnid.exe 37 PID 2192 wrote to memory of 484 2192 iqnid.exe 37 PID 2192 wrote to memory of 484 2192 iqnid.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.a4ea33709df3ce221d3be12e067f7c60.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.a4ea33709df3ce221d3be12e067f7c60.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\vitij.exe"C:\Users\Admin\AppData\Local\Temp\vitij.exe" hi2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\jonyru.exe"C:\Users\Admin\AppData\Local\Temp\jonyru.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\iqnid.exe"C:\Users\Admin\AppData\Local\Temp\iqnid.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 365⤵
- Loads dropped DLL
- Program crash
PID:484
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:1092
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD561ff9e46bbebcd9b0587e29d054f89e3
SHA1850fa9e66645a6ee6f0cc6a575a25cf1a68e0fd2
SHA256e974244c72cc7f5068419ae13737e0980be8dd1e86b000e079083bb22416a4d2
SHA5122fa61a3f5ceb0a2effaef6261e52d66d5a00857e75d41a79d8273f47d9acfc229866a8c8dab12552008aa16e8e90b7a051634f31d965a9aae9dc95f594900896
-
Filesize
224B
MD561ff9e46bbebcd9b0587e29d054f89e3
SHA1850fa9e66645a6ee6f0cc6a575a25cf1a68e0fd2
SHA256e974244c72cc7f5068419ae13737e0980be8dd1e86b000e079083bb22416a4d2
SHA5122fa61a3f5ceb0a2effaef6261e52d66d5a00857e75d41a79d8273f47d9acfc229866a8c8dab12552008aa16e8e90b7a051634f31d965a9aae9dc95f594900896
-
Filesize
286B
MD5bbe3f8be2df65bea4e3f02ecb238952b
SHA132e34d9ad65d2993f97c637e52e8ad283ee0a6ae
SHA256b990a895bceb1403bf82b3cbdec6267a2ef60a8bac8005ad21461d5a3bc959a1
SHA51224c319a89cf38355d8cab2054f0b4a2a809735068939505a65daa318d805394c4043357e96748ea65111e2509d7bb5f5fa07a0b6019579312fc586ebb716c9e2
-
Filesize
286B
MD5bbe3f8be2df65bea4e3f02ecb238952b
SHA132e34d9ad65d2993f97c637e52e8ad283ee0a6ae
SHA256b990a895bceb1403bf82b3cbdec6267a2ef60a8bac8005ad21461d5a3bc959a1
SHA51224c319a89cf38355d8cab2054f0b4a2a809735068939505a65daa318d805394c4043357e96748ea65111e2509d7bb5f5fa07a0b6019579312fc586ebb716c9e2
-
Filesize
512B
MD5e45fc860e4c1596faccb34509f61bbad
SHA1102309133738b63dfd7d57a94bd40bd3b2caa27e
SHA256bb14352051745e3db48c3a58961ac2301a02cfadb0bbb354febd78dcbc1e019a
SHA512690e5eeab7defe28e693aa8878e3f2db39b9e03f3554877a81c61eeba4d16b03b1cff92c086118b2f82d7221b3747dcf225a22216b3b10598a3aa1146329c13b
-
Filesize
223KB
MD53d95a5cae78d3e742decd8dd10628127
SHA1523ccba9072ca2f418d4c1f89ef0173ee5c19617
SHA25657d18a19d77641e32c507b0840b98daefac8aeb45919b6165a18749274ab41db
SHA512c15440ca03a30720b64924848803c4756b010839cef1043d257a2a558b2a4298931d475bd114760638153db6fcd2cf73842ca9a17465fc2f4bf5762f245f8605
-
Filesize
223KB
MD53d95a5cae78d3e742decd8dd10628127
SHA1523ccba9072ca2f418d4c1f89ef0173ee5c19617
SHA25657d18a19d77641e32c507b0840b98daefac8aeb45919b6165a18749274ab41db
SHA512c15440ca03a30720b64924848803c4756b010839cef1043d257a2a558b2a4298931d475bd114760638153db6fcd2cf73842ca9a17465fc2f4bf5762f245f8605
-
Filesize
462KB
MD5d2eeb53fef57ec5b96a572d78735c6b7
SHA1936361ea3d0977da6c2f4e397e56982f66e83b7c
SHA256093ce0e8f2a807497bb4eb8c1f896b273bc31d81b2153ab35ea2f5ce1fbecd7b
SHA512c3eee43d303081accd398a6804c3f3f93d508a0cc0a5e6fe645366feda9b451f17e6618cac371110a9c72d303b280e2f8e009dc599173f43eefbd959ab6d1a85
-
Filesize
462KB
MD5d2eeb53fef57ec5b96a572d78735c6b7
SHA1936361ea3d0977da6c2f4e397e56982f66e83b7c
SHA256093ce0e8f2a807497bb4eb8c1f896b273bc31d81b2153ab35ea2f5ce1fbecd7b
SHA512c3eee43d303081accd398a6804c3f3f93d508a0cc0a5e6fe645366feda9b451f17e6618cac371110a9c72d303b280e2f8e009dc599173f43eefbd959ab6d1a85
-
Filesize
462KB
MD5d2eeb53fef57ec5b96a572d78735c6b7
SHA1936361ea3d0977da6c2f4e397e56982f66e83b7c
SHA256093ce0e8f2a807497bb4eb8c1f896b273bc31d81b2153ab35ea2f5ce1fbecd7b
SHA512c3eee43d303081accd398a6804c3f3f93d508a0cc0a5e6fe645366feda9b451f17e6618cac371110a9c72d303b280e2f8e009dc599173f43eefbd959ab6d1a85
-
Filesize
462KB
MD523ecdb01b7d8c144c25670d7ec61613b
SHA1fb94098ad434b0920fa667ea4991a66f3aa11ca5
SHA256c6f2d84de90fc912c114ab92f977ebea84c1fd6723c38420620a4b0171251eea
SHA512eb86c323c10c17e6842df91cccb2d1bcbc1cea1c798a09145f4b039d2ebfd5290ab349bd58c285f4a18264a71dfc5a1c53aee32269a61ed4db45ce39c41a81cf
-
Filesize
462KB
MD523ecdb01b7d8c144c25670d7ec61613b
SHA1fb94098ad434b0920fa667ea4991a66f3aa11ca5
SHA256c6f2d84de90fc912c114ab92f977ebea84c1fd6723c38420620a4b0171251eea
SHA512eb86c323c10c17e6842df91cccb2d1bcbc1cea1c798a09145f4b039d2ebfd5290ab349bd58c285f4a18264a71dfc5a1c53aee32269a61ed4db45ce39c41a81cf
-
Filesize
223KB
MD53d95a5cae78d3e742decd8dd10628127
SHA1523ccba9072ca2f418d4c1f89ef0173ee5c19617
SHA25657d18a19d77641e32c507b0840b98daefac8aeb45919b6165a18749274ab41db
SHA512c15440ca03a30720b64924848803c4756b010839cef1043d257a2a558b2a4298931d475bd114760638153db6fcd2cf73842ca9a17465fc2f4bf5762f245f8605
-
Filesize
223KB
MD53d95a5cae78d3e742decd8dd10628127
SHA1523ccba9072ca2f418d4c1f89ef0173ee5c19617
SHA25657d18a19d77641e32c507b0840b98daefac8aeb45919b6165a18749274ab41db
SHA512c15440ca03a30720b64924848803c4756b010839cef1043d257a2a558b2a4298931d475bd114760638153db6fcd2cf73842ca9a17465fc2f4bf5762f245f8605
-
Filesize
223KB
MD53d95a5cae78d3e742decd8dd10628127
SHA1523ccba9072ca2f418d4c1f89ef0173ee5c19617
SHA25657d18a19d77641e32c507b0840b98daefac8aeb45919b6165a18749274ab41db
SHA512c15440ca03a30720b64924848803c4756b010839cef1043d257a2a558b2a4298931d475bd114760638153db6fcd2cf73842ca9a17465fc2f4bf5762f245f8605
-
Filesize
223KB
MD53d95a5cae78d3e742decd8dd10628127
SHA1523ccba9072ca2f418d4c1f89ef0173ee5c19617
SHA25657d18a19d77641e32c507b0840b98daefac8aeb45919b6165a18749274ab41db
SHA512c15440ca03a30720b64924848803c4756b010839cef1043d257a2a558b2a4298931d475bd114760638153db6fcd2cf73842ca9a17465fc2f4bf5762f245f8605
-
Filesize
223KB
MD53d95a5cae78d3e742decd8dd10628127
SHA1523ccba9072ca2f418d4c1f89ef0173ee5c19617
SHA25657d18a19d77641e32c507b0840b98daefac8aeb45919b6165a18749274ab41db
SHA512c15440ca03a30720b64924848803c4756b010839cef1043d257a2a558b2a4298931d475bd114760638153db6fcd2cf73842ca9a17465fc2f4bf5762f245f8605
-
Filesize
223KB
MD53d95a5cae78d3e742decd8dd10628127
SHA1523ccba9072ca2f418d4c1f89ef0173ee5c19617
SHA25657d18a19d77641e32c507b0840b98daefac8aeb45919b6165a18749274ab41db
SHA512c15440ca03a30720b64924848803c4756b010839cef1043d257a2a558b2a4298931d475bd114760638153db6fcd2cf73842ca9a17465fc2f4bf5762f245f8605
-
Filesize
462KB
MD5d2eeb53fef57ec5b96a572d78735c6b7
SHA1936361ea3d0977da6c2f4e397e56982f66e83b7c
SHA256093ce0e8f2a807497bb4eb8c1f896b273bc31d81b2153ab35ea2f5ce1fbecd7b
SHA512c3eee43d303081accd398a6804c3f3f93d508a0cc0a5e6fe645366feda9b451f17e6618cac371110a9c72d303b280e2f8e009dc599173f43eefbd959ab6d1a85
-
Filesize
462KB
MD523ecdb01b7d8c144c25670d7ec61613b
SHA1fb94098ad434b0920fa667ea4991a66f3aa11ca5
SHA256c6f2d84de90fc912c114ab92f977ebea84c1fd6723c38420620a4b0171251eea
SHA512eb86c323c10c17e6842df91cccb2d1bcbc1cea1c798a09145f4b039d2ebfd5290ab349bd58c285f4a18264a71dfc5a1c53aee32269a61ed4db45ce39c41a81cf