Analysis
-
max time kernel
202s -
max time network
218s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01-11-2023 08:28
Behavioral task
behavioral1
Sample
NEAS.d33e60f3d729c3d76233258601398387.exe
Resource
win7-20231023-en
General
-
Target
NEAS.d33e60f3d729c3d76233258601398387.exe
-
Size
157KB
-
MD5
d33e60f3d729c3d76233258601398387
-
SHA1
ce407014f7b07cf54076f93cae7569330069a098
-
SHA256
5bd781d69f61aefe65034c6602a9ddcfc8ca2d0b1e19c6e240126efe29994bdc
-
SHA512
f6a4b02717916f5c86206ae36d8d02159c3cdb88d12ca44938c7537bbc0f060aab1f6040429b24339223155a13dd168382de329f286dcbae54d4289759f37bed
-
SSDEEP
384:+BdCJAKQDuuOFZyUVpULCgDb2prxVTw24I+6Al6zKyXxKDglgTlkgUH/a7wwwp:MdCyTDcZyUpULCgodM96eyXsOf4wwwp
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2872 attrib.exe -
Deletes itself 1 IoCs
pid Process 2488 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1636 beqhost.exe -
resource yara_rule behavioral1/memory/2760-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2760-3-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00060000000120e5-4.dat upx behavioral1/files/0x00060000000120e5-5.dat upx behavioral1/memory/1636-6-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Debug\beqhost.exe NEAS.d33e60f3d729c3d76233258601398387.exe File opened for modification C:\Windows\Debug\beqhost.exe attrib.exe File created C:\Windows\Debug\beqhost.exe NEAS.d33e60f3d729c3d76233258601398387.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2760 NEAS.d33e60f3d729c3d76233258601398387.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2872 2760 NEAS.d33e60f3d729c3d76233258601398387.exe 29 PID 2760 wrote to memory of 2872 2760 NEAS.d33e60f3d729c3d76233258601398387.exe 29 PID 2760 wrote to memory of 2872 2760 NEAS.d33e60f3d729c3d76233258601398387.exe 29 PID 2760 wrote to memory of 2872 2760 NEAS.d33e60f3d729c3d76233258601398387.exe 29 PID 2760 wrote to memory of 2488 2760 NEAS.d33e60f3d729c3d76233258601398387.exe 32 PID 2760 wrote to memory of 2488 2760 NEAS.d33e60f3d729c3d76233258601398387.exe 32 PID 2760 wrote to memory of 2488 2760 NEAS.d33e60f3d729c3d76233258601398387.exe 32 PID 2760 wrote to memory of 2488 2760 NEAS.d33e60f3d729c3d76233258601398387.exe 32 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2872 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d33e60f3d729c3d76233258601398387.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d33e60f3d729c3d76233258601398387.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\beqhost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:2872
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\NEASD3~1.EXE > nul2⤵
- Deletes itself
PID:2488
-
-
C:\Windows\Debug\beqhost.exeC:\Windows\Debug\beqhost.exe1⤵
- Executes dropped EXE
PID:1636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157KB
MD52a05ae098d52eda03aef3cddc64aa980
SHA1d29aab8a68f8f744dabe0b95aa74611c658ed22b
SHA256edd45fff5307fd8a199efffb4649a7d63d15bdc588535d20259697aeae006993
SHA51228985098acb3fa87dbf6aac8880969787e2140a0840df808abdd30f4a79b86918664b606b20cdf0baa2e61bdec68a41c798446d738f7ad1baf8347429f99f72e
-
Filesize
157KB
MD52a05ae098d52eda03aef3cddc64aa980
SHA1d29aab8a68f8f744dabe0b95aa74611c658ed22b
SHA256edd45fff5307fd8a199efffb4649a7d63d15bdc588535d20259697aeae006993
SHA51228985098acb3fa87dbf6aac8880969787e2140a0840df808abdd30f4a79b86918664b606b20cdf0baa2e61bdec68a41c798446d738f7ad1baf8347429f99f72e