Analysis
-
max time kernel
155s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2023 13:53
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.10b25594c41492b534f7547668179c80.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.10b25594c41492b534f7547668179c80.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.10b25594c41492b534f7547668179c80.exe
-
Size
36KB
-
MD5
10b25594c41492b534f7547668179c80
-
SHA1
94a900e0a7b2190976d75c4aa46d1f10c02fc90f
-
SHA256
331829fc482abe14911c0781da1a67d13a7935516140447d096f94fd5f49a509
-
SHA512
a2ab8891dd48ff51c13f48d12e488b5b1e93e2dbe7c79e3960218469869788133342981d2b60e2eb8307035200386fc6c75194d328c268c0f6f50ac3d26879d4
-
SSDEEP
384:Z+k6uBAGaiMv1u95RkMWgHKBcKu0aevN9TOpiK1XZUnI8gdAA:jAQMv1053WdBNuqnTMGI8gKA
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
NEAS.10b25594c41492b534f7547668179c80.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\I-Worm.GiGu = "uGiG.eXe" NEAS.10b25594c41492b534f7547668179c80.exe -
Drops file in System32 directory 3 IoCs
Processes:
NEAS.10b25594c41492b534f7547668179c80.exedescription ioc process File created C:\Windows\SysWOW64\GiGu.eXe NEAS.10b25594c41492b534f7547668179c80.exe File opened for modification C:\Windows\SysWOW64\GiGu.eXe NEAS.10b25594c41492b534f7547668179c80.exe File created C:\Windows\SysWOW64\GiGu.eml NEAS.10b25594c41492b534f7547668179c80.exe -
Drops file in Windows directory 2 IoCs
Processes:
NEAS.10b25594c41492b534f7547668179c80.exedescription ioc process File opened for modification C:\Windows\uGiG.eXe NEAS.10b25594c41492b534f7547668179c80.exe File created C:\Windows\uGiG.eXe NEAS.10b25594c41492b534f7547668179c80.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2692 4004 WerFault.exe NEAS.10b25594c41492b534f7547668179c80.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
NEAS.10b25594c41492b534f7547668179c80.exepid process 4004 NEAS.10b25594c41492b534f7547668179c80.exe 4004 NEAS.10b25594c41492b534f7547668179c80.exe 4004 NEAS.10b25594c41492b534f7547668179c80.exe 4004 NEAS.10b25594c41492b534f7547668179c80.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeManageVolumePrivilege 2176 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.10b25594c41492b534f7547668179c80.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.10b25594c41492b534f7547668179c80.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 5162⤵
- Program crash
PID:2692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4004 -ip 40041⤵PID:4716
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3700
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5966aff50eefad4cd8fe638b3a1e9cb92
SHA11b731c6583f26837f244be5f87c02443942a7948
SHA256cf64779e4d3f5dfd4f0971567843c212c4408365c402b4fb62fd0601242a7b36
SHA512dc22c9f2f815d579cd283c6db78befec9cae18bb48ac187e745e6dd4aed69ce348582b6278eb87f52d5dd979bf961b7c73ef9a5aebb92b563116675be5e8f1ed