Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    01/11/2023, 14:13

General

  • Target

    NEAS.853561e09524e38d64ccc1beaa194ee0.exe

  • Size

    932KB

  • MD5

    853561e09524e38d64ccc1beaa194ee0

  • SHA1

    1ec7808d172c3de28698cd1d33fcae83eecb986f

  • SHA256

    2b71e5bff3f95c34410c3f734a279cd2d1d868a325831021afe4cc688ea0b425

  • SHA512

    97394761ef0b46ac5419592ebf295257c0d9ab050f38aabd5b317a20d80c9ba1e7b7e40924fa3aa3b521ccef84209b1c675b03e6ac2426bf4af53f077e7a86c6

  • SSDEEP

    24576:71/aGLDCM4D8ayGMZo8/6sduXSGf/aZRxrOSVdUd+b2lSbs3xcwbiBEz:0D8ayGMZoeuXSGnaZRxrOSVdUd+b2lSc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.853561e09524e38d64ccc1beaa194ee0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.853561e09524e38d64ccc1beaa194ee0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\ProgramData\cxrpj.exe
      "C:\ProgramData\cxrpj.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Documents and Settings .exe

    Filesize

    932KB

    MD5

    2e22007d28a8046ffd2b8690668cca00

    SHA1

    449cb0747d5ecf291fac83f1e7c6aa4275bd4aed

    SHA256

    76d838e7e04ade0081dd4c7be6b6155e4c89d10100146173637cacdd253265c5

    SHA512

    0eb967dd499df8bf063054d8285c62be0a42a393fb1b9af4a646e2d060279974d9e49076febfac6098a526ccaffd0f944a9e8ec2cc45142e862af1b252906c11

  • C:\ProgramData\Saaaalamm\Mira.h

    Filesize

    477KB

    MD5

    71e38cb8371fa644436922e0eee6040d

    SHA1

    6e9e897cb95fd8434891e87a584f5f1b9482cae2

    SHA256

    2c97f31658ca63791439d384a5c4488bdca89adac6c363c2cc97e5763af30db4

    SHA512

    852954de6ce9732c6533d475ebd22f308c5659690d5197dd5865cde0ef740b40f380035baf8d9e6e38dc0541b5f16ffb01ea1560cbb89528ec4b2214c7fcc3be

  • C:\ProgramData\Saaaalamm\Mira.h

    Filesize

    477KB

    MD5

    71e38cb8371fa644436922e0eee6040d

    SHA1

    6e9e897cb95fd8434891e87a584f5f1b9482cae2

    SHA256

    2c97f31658ca63791439d384a5c4488bdca89adac6c363c2cc97e5763af30db4

    SHA512

    852954de6ce9732c6533d475ebd22f308c5659690d5197dd5865cde0ef740b40f380035baf8d9e6e38dc0541b5f16ffb01ea1560cbb89528ec4b2214c7fcc3be

  • C:\ProgramData\cxrpj.exe

    Filesize

    454KB

    MD5

    1ab0f27a7a5da00733f78b18c5ebf9c1

    SHA1

    d70ebfd6db5a412bdb6370cbd5e73cdc9df8ed0e

    SHA256

    60f1ffb77057a1fbd37d64a18b0dede1a3482dc0f6f3149b6166a70686e993d2

    SHA512

    de3404a444f7ccf9eb3e022f21f226b9a175eec4f30fb4814d54cb3530f843334f5d9d9138acfbab1f3a3d70312e3cc7c12a6614ed8674c99467fa5c6a2291ae

  • C:\ProgramData\cxrpj.exe

    Filesize

    454KB

    MD5

    1ab0f27a7a5da00733f78b18c5ebf9c1

    SHA1

    d70ebfd6db5a412bdb6370cbd5e73cdc9df8ed0e

    SHA256

    60f1ffb77057a1fbd37d64a18b0dede1a3482dc0f6f3149b6166a70686e993d2

    SHA512

    de3404a444f7ccf9eb3e022f21f226b9a175eec4f30fb4814d54cb3530f843334f5d9d9138acfbab1f3a3d70312e3cc7c12a6614ed8674c99467fa5c6a2291ae

  • C:\ProgramData\cxrpj.exe

    Filesize

    454KB

    MD5

    1ab0f27a7a5da00733f78b18c5ebf9c1

    SHA1

    d70ebfd6db5a412bdb6370cbd5e73cdc9df8ed0e

    SHA256

    60f1ffb77057a1fbd37d64a18b0dede1a3482dc0f6f3149b6166a70686e993d2

    SHA512

    de3404a444f7ccf9eb3e022f21f226b9a175eec4f30fb4814d54cb3530f843334f5d9d9138acfbab1f3a3d70312e3cc7c12a6614ed8674c99467fa5c6a2291ae

  • \ProgramData\cxrpj.exe

    Filesize

    454KB

    MD5

    1ab0f27a7a5da00733f78b18c5ebf9c1

    SHA1

    d70ebfd6db5a412bdb6370cbd5e73cdc9df8ed0e

    SHA256

    60f1ffb77057a1fbd37d64a18b0dede1a3482dc0f6f3149b6166a70686e993d2

    SHA512

    de3404a444f7ccf9eb3e022f21f226b9a175eec4f30fb4814d54cb3530f843334f5d9d9138acfbab1f3a3d70312e3cc7c12a6614ed8674c99467fa5c6a2291ae

  • \ProgramData\cxrpj.exe

    Filesize

    454KB

    MD5

    1ab0f27a7a5da00733f78b18c5ebf9c1

    SHA1

    d70ebfd6db5a412bdb6370cbd5e73cdc9df8ed0e

    SHA256

    60f1ffb77057a1fbd37d64a18b0dede1a3482dc0f6f3149b6166a70686e993d2

    SHA512

    de3404a444f7ccf9eb3e022f21f226b9a175eec4f30fb4814d54cb3530f843334f5d9d9138acfbab1f3a3d70312e3cc7c12a6614ed8674c99467fa5c6a2291ae

  • memory/2300-103-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/2300-182-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/2300-485-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/2512-0-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2512-13-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB