Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    01-11-2023 04:46

General

  • Target

    NEAS.75aff5bd6d678fab7728a89176d2d1d0.exe

  • Size

    198KB

  • MD5

    75aff5bd6d678fab7728a89176d2d1d0

  • SHA1

    23e463153413f37129c2665b554bcf4bdbdd1c86

  • SHA256

    e4b7af4a23bf616896d16cb2d68b73701fe2b3826a5471b0c234dda09f30e398

  • SHA512

    2fcaf6895f35833a04653ff8bcde2bdccb7d8ddd4c9a666b62ceb1b277104a50ddb1c432235978be12b106e7e0f31b0f6bf7f193bf1539adca2fb44f8b31b251

  • SSDEEP

    3072:5U+W+qNo3e9Sy/9sWWWjG7PL7KD333CLP3ZYkBfffAVpE/222MsKjhppt:G+WJ9SSlGrL7K+LP+AfffAVpEzppt

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 15 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1328
      • C:\Users\Admin\AppData\Local\Temp\NEAS.75aff5bd6d678fab7728a89176d2d1d0.exe
        "C:\Users\Admin\AppData\Local\Temp\NEAS.75aff5bd6d678fab7728a89176d2d1d0.exe"
        2⤵
        • Adds Run key to start application
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2376
        • C:\Users\Admin\AppData\Local\Temp\NEAS.75aff5bd6d678fab7728a89176d2d1d0.exe
          "C:\Users\Admin\AppData\Local\Temp\NEAS.75aff5bd6d678fab7728a89176d2d1d0.exe"
          3⤵
            PID:1460

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\ose00000.exe

        Filesize

        150KB

        MD5

        c8186eef89e38f7e5181c0a40a0d11e4

        SHA1

        aa0db049680ab96bef493d4e39ebd45851e1b8e5

        SHA256

        65de9cd3a840037ca09a795d2632eba7e4dd06429229d4c7568a7f8ccc7adaee

        SHA512

        cd21f71fb5ca38b96b9cdac19f2f909ef7cf397629687ef44abf46e848a2262f868549511faf9733a721053da6914fab2720e03c8c4be5d7dbe9c1335489c144

      • memory/1328-1-0x0000000002960000-0x0000000002961000-memory.dmp

        Filesize

        4KB

      • memory/1328-3-0x0000000002960000-0x0000000002961000-memory.dmp

        Filesize

        4KB