Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    01/11/2023, 02:59

General

  • Target

    NEAS.9af01ff47c8e2052a3da7b8f81adfc80.exe

  • Size

    426KB

  • MD5

    9af01ff47c8e2052a3da7b8f81adfc80

  • SHA1

    854d4f19dddaf8a212e101e4740c6ce8f2170bd5

  • SHA256

    a2a0b71978917f72f73a1e9e2cc2966521ccbe6a57781fc392a1d8f3738acf8d

  • SHA512

    5f3a51c9372893cd2a2fddc12d07a19a217561a59f230998c1bafcb5445c4b08abefd5c2aed9222a8ca1c6debd45ffef9060a439646434f44bfae25fe20d42b4

  • SSDEEP

    6144:gdspDeDrxkg/vrMuJIgwhEFHyOrJcX/Pgqwzm5IzkWjS4e4azExBKO1t4Kb70Nqx:G8kxNhOZElO5kkWjhD4AF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 34 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 2 IoCs
  • Modifies registry class 38 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.9af01ff47c8e2052a3da7b8f81adfc80.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.9af01ff47c8e2052a3da7b8f81adfc80.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\$Recycle.Bin\HYQ.EXE
      C:\$Recycle.Bin\HYQ.EXE
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Modifies registry class
      PID:2644

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\HYQ.EXE

          Filesize

          426KB

          MD5

          1cd9e52c6b9bf3e7f8acc6a5002c5ee5

          SHA1

          d47dd0cc6191339eaf2dd77d5dcc6f82261ce8f2

          SHA256

          2fdf6bb97f1b7498a4a31476c0274b4a5ca1407bffdf75b6bff0406c5898f05d

          SHA512

          aeae5b6c4111bb8bb44b97529bff2fc2458ce0f02e657367720dc1708ae882d2688c12be27c6a85a20fcea7f1f4b9880d3e2bfdf88f394e18dee6f5139b7785a

        • C:\$Recycle.Bin\HYQ.EXE

          Filesize

          426KB

          MD5

          1cd9e52c6b9bf3e7f8acc6a5002c5ee5

          SHA1

          d47dd0cc6191339eaf2dd77d5dcc6f82261ce8f2

          SHA256

          2fdf6bb97f1b7498a4a31476c0274b4a5ca1407bffdf75b6bff0406c5898f05d

          SHA512

          aeae5b6c4111bb8bb44b97529bff2fc2458ce0f02e657367720dc1708ae882d2688c12be27c6a85a20fcea7f1f4b9880d3e2bfdf88f394e18dee6f5139b7785a

        • C:\PerfLogs\EJU.EXE

          Filesize

          426KB

          MD5

          0af3f7300eacb31c7da69f00510f115e

          SHA1

          158203916d90c878ae53e57248933ee1e1a43b74

          SHA256

          d1e315f45df978b8ce2231e05822db00e84214932e654560f8dcc21e49ae9146

          SHA512

          4bc8937e73b0a4e091c643cbedfdfac7165b002368c6f41f58be4ba7a30f6db7049c761dfa6c0a1119bf8b17ea4c4c6d49748076b792cc65e49007c6f21f1a74

        • \$Recycle.Bin\HYQ.EXE

          Filesize

          426KB

          MD5

          1cd9e52c6b9bf3e7f8acc6a5002c5ee5

          SHA1

          d47dd0cc6191339eaf2dd77d5dcc6f82261ce8f2

          SHA256

          2fdf6bb97f1b7498a4a31476c0274b4a5ca1407bffdf75b6bff0406c5898f05d

          SHA512

          aeae5b6c4111bb8bb44b97529bff2fc2458ce0f02e657367720dc1708ae882d2688c12be27c6a85a20fcea7f1f4b9880d3e2bfdf88f394e18dee6f5139b7785a

        • \$Recycle.Bin\HYQ.EXE

          Filesize

          426KB

          MD5

          1cd9e52c6b9bf3e7f8acc6a5002c5ee5

          SHA1

          d47dd0cc6191339eaf2dd77d5dcc6f82261ce8f2

          SHA256

          2fdf6bb97f1b7498a4a31476c0274b4a5ca1407bffdf75b6bff0406c5898f05d

          SHA512

          aeae5b6c4111bb8bb44b97529bff2fc2458ce0f02e657367720dc1708ae882d2688c12be27c6a85a20fcea7f1f4b9880d3e2bfdf88f394e18dee6f5139b7785a

        • memory/2600-0-0x0000000000260000-0x0000000000261000-memory.dmp

          Filesize

          4KB

        • memory/2644-22-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB