Analysis
-
max time kernel
120s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
01-11-2023 08:27
Behavioral task
behavioral1
Sample
NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe
Resource
win7-20231020-en
General
-
Target
NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe
-
Size
465KB
-
MD5
3837a2c234eba6152f5cfc9a5338ab73
-
SHA1
d843b155d39229809bdef898ae48190d6f108847
-
SHA256
8e620732f8541c584216d580057f165cbe982393eeed7c38d98fef2c335f2286
-
SHA512
fbcc057cf4d4ee16296546e00cebdce20ade0a5930c4d023c5ee2c96a5d0fb9a3ed256dc0827c19c50012919635465af2a8fa96d300cefb64275314e089f625b
-
SSDEEP
6144:k9H4y9VOpL/DeRRoSGFPRuDYBzFrY5dRA2AkCMnZi6c/2AS9kFwJARejm7C:kZF9VOpnqoSG1EcBhs9xAkLZMomC
Malware Config
Extracted
urelas
121.88.5.183
218.54.30.235
Signatures
-
Deletes itself 1 IoCs
pid Process 2808 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2636 sander.exe -
Loads dropped DLL 1 IoCs
pid Process 2248 NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe -
resource yara_rule behavioral1/memory/2248-0-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/files/0x002e0000000153cf-4.dat upx behavioral1/memory/2636-9-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/files/0x002e0000000153cf-7.dat upx behavioral1/memory/2248-17-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/2636-20-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/2636-21-0x0000000000400000-0x00000000004A9000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2636 2248 NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe 28 PID 2248 wrote to memory of 2636 2248 NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe 28 PID 2248 wrote to memory of 2636 2248 NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe 28 PID 2248 wrote to memory of 2636 2248 NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe 28 PID 2248 wrote to memory of 2808 2248 NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe 30 PID 2248 wrote to memory of 2808 2248 NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe 30 PID 2248 wrote to memory of 2808 2248 NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe 30 PID 2248 wrote to memory of 2808 2248 NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\sander.exe"C:\Users\Admin\AppData\Local\Temp\sander.exe"2⤵
- Executes dropped EXE
PID:2636
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_sannuyex.bat" "2⤵
- Deletes itself
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
287B
MD5c06d75b573f85b204d70a5203f20f65d
SHA1669035eaa6eed8808c0da743f4a91431071851d2
SHA256ec40eac232f7d3d7ff74dfa9202b55acdb3cd58d0883f4736a69229d76d30430
SHA512ff889f3e504d45e29763aef2c07ce4bf810b3e19eb451def62ff01e6fca9becab7ff2b09a551c45b9b843e3472f71f907c522e45220b4b46a1a2b269953e146a
-
Filesize
287B
MD5c06d75b573f85b204d70a5203f20f65d
SHA1669035eaa6eed8808c0da743f4a91431071851d2
SHA256ec40eac232f7d3d7ff74dfa9202b55acdb3cd58d0883f4736a69229d76d30430
SHA512ff889f3e504d45e29763aef2c07ce4bf810b3e19eb451def62ff01e6fca9becab7ff2b09a551c45b9b843e3472f71f907c522e45220b4b46a1a2b269953e146a
-
Filesize
512B
MD5178eba193b631d7b0653896453b678b2
SHA18878cae8fb5417248da5800e4d85b00149160404
SHA2568c7800dfaf639b17e6b682b6fa2365275e6f80d07e6aa6bb56b676669d0e9db5
SHA512936f9ec171c7ad5aa63c6691d9ea109a3f1ef31fe00bc26fe5afa8ae0ee21b5d3f65e873a242e7986f98bcb9abc82911dbf34bb907ed7a4973e959b7e90c69d5
-
Filesize
465KB
MD5373c9fc0808c161d35c0f56491d438d8
SHA1ad423d7ddaeac656f5bc1aa9425b83632705da61
SHA2568007149254fc11c4b102ef6fbba32e82dd1910ffa100298ea431c78de2d20ffe
SHA51278e906c4e4f32b451410ef7b0ec7ce08fcc115886d85f5cd8140a24210a82a457ed2b54bf986ce9a00f722fef3d9952345c229ab6db3ac85304834873cefd387
-
Filesize
465KB
MD5373c9fc0808c161d35c0f56491d438d8
SHA1ad423d7ddaeac656f5bc1aa9425b83632705da61
SHA2568007149254fc11c4b102ef6fbba32e82dd1910ffa100298ea431c78de2d20ffe
SHA51278e906c4e4f32b451410ef7b0ec7ce08fcc115886d85f5cd8140a24210a82a457ed2b54bf986ce9a00f722fef3d9952345c229ab6db3ac85304834873cefd387