Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    01/11/2023, 03:08

General

  • Target

    NEAS.45c67e82d5e3084172b7ed17a021c4f0.exe

  • Size

    21KB

  • MD5

    45c67e82d5e3084172b7ed17a021c4f0

  • SHA1

    59aba63c4ce1dc10678443839d770b6445cb37b2

  • SHA256

    ad2d81fdca6722c9e02c7661ee9c3d6cd83599820d17e4a1d6667f02b4079d22

  • SHA512

    3e44413768997eaad8db76cba8e34d0cbfbde0ed2c154841fc71487d3f613c45ecc1f9cad6e823a4cf176c267ff835edc3f1c988839e71c9ef99ed10422f385a

  • SSDEEP

    384:lFFxBmppyRGn3SDyD+w5zYQ/T6Mg7+fKZ:zFxIppD+CT677+S

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.45c67e82d5e3084172b7ed17a021c4f0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.45c67e82d5e3084172b7ed17a021c4f0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Users\Admin\AppData\Local\Temp\fulik.exe
      "C:\Users\Admin\AppData\Local\Temp\fulik.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\fulik.exe

    Filesize

    21KB

    MD5

    0449780393067d3be00bf2f02e04f9c0

    SHA1

    574cd36005c379f03b55894ed80881c47b9c2071

    SHA256

    22b36ccc210065f59eebf71e111238b34263f736b0d4c01d1cc329cfdf6ae89f

    SHA512

    be95556b85b82ef7980d5348106df7af6ea64aea5c3853af64335f5185cee28d69c4d9ed5b9de6756349d6300e8212fb63bfa2171cc4d9e24f71919d7f8c4b29

  • C:\Users\Admin\AppData\Local\Temp\fulik.exe

    Filesize

    21KB

    MD5

    0449780393067d3be00bf2f02e04f9c0

    SHA1

    574cd36005c379f03b55894ed80881c47b9c2071

    SHA256

    22b36ccc210065f59eebf71e111238b34263f736b0d4c01d1cc329cfdf6ae89f

    SHA512

    be95556b85b82ef7980d5348106df7af6ea64aea5c3853af64335f5185cee28d69c4d9ed5b9de6756349d6300e8212fb63bfa2171cc4d9e24f71919d7f8c4b29

  • C:\Users\Admin\AppData\Local\Temp\fulik.exe

    Filesize

    21KB

    MD5

    0449780393067d3be00bf2f02e04f9c0

    SHA1

    574cd36005c379f03b55894ed80881c47b9c2071

    SHA256

    22b36ccc210065f59eebf71e111238b34263f736b0d4c01d1cc329cfdf6ae89f

    SHA512

    be95556b85b82ef7980d5348106df7af6ea64aea5c3853af64335f5185cee28d69c4d9ed5b9de6756349d6300e8212fb63bfa2171cc4d9e24f71919d7f8c4b29

  • \Users\Admin\AppData\Local\Temp\fulik.exe

    Filesize

    21KB

    MD5

    0449780393067d3be00bf2f02e04f9c0

    SHA1

    574cd36005c379f03b55894ed80881c47b9c2071

    SHA256

    22b36ccc210065f59eebf71e111238b34263f736b0d4c01d1cc329cfdf6ae89f

    SHA512

    be95556b85b82ef7980d5348106df7af6ea64aea5c3853af64335f5185cee28d69c4d9ed5b9de6756349d6300e8212fb63bfa2171cc4d9e24f71919d7f8c4b29

  • \Users\Admin\AppData\Local\Temp\fulik.exe

    Filesize

    21KB

    MD5

    0449780393067d3be00bf2f02e04f9c0

    SHA1

    574cd36005c379f03b55894ed80881c47b9c2071

    SHA256

    22b36ccc210065f59eebf71e111238b34263f736b0d4c01d1cc329cfdf6ae89f

    SHA512

    be95556b85b82ef7980d5348106df7af6ea64aea5c3853af64335f5185cee28d69c4d9ed5b9de6756349d6300e8212fb63bfa2171cc4d9e24f71919d7f8c4b29

  • memory/1620-0-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2340-11-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB