Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 14:13
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.853561e09524e38d64ccc1beaa194ee0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.853561e09524e38d64ccc1beaa194ee0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.853561e09524e38d64ccc1beaa194ee0.exe
-
Size
932KB
-
MD5
853561e09524e38d64ccc1beaa194ee0
-
SHA1
1ec7808d172c3de28698cd1d33fcae83eecb986f
-
SHA256
2b71e5bff3f95c34410c3f734a279cd2d1d868a325831021afe4cc688ea0b425
-
SHA512
97394761ef0b46ac5419592ebf295257c0d9ab050f38aabd5b317a20d80c9ba1e7b7e40924fa3aa3b521ccef84209b1c675b03e6ac2426bf4af53f077e7a86c6
-
SSDEEP
24576:71/aGLDCM4D8ayGMZo8/6sduXSGf/aZRxrOSVdUd+b2lSbs3xcwbiBEz:0D8ayGMZoeuXSGnaZRxrOSVdUd+b2lSc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2300 cxrpj.exe -
Loads dropped DLL 2 IoCs
pid Process 2512 NEAS.853561e09524e38d64ccc1beaa194ee0.exe 2512 NEAS.853561e09524e38d64ccc1beaa194ee0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\cxrpj.exe" cxrpj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2300 2512 NEAS.853561e09524e38d64ccc1beaa194ee0.exe 28 PID 2512 wrote to memory of 2300 2512 NEAS.853561e09524e38d64ccc1beaa194ee0.exe 28 PID 2512 wrote to memory of 2300 2512 NEAS.853561e09524e38d64ccc1beaa194ee0.exe 28 PID 2512 wrote to memory of 2300 2512 NEAS.853561e09524e38d64ccc1beaa194ee0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.853561e09524e38d64ccc1beaa194ee0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.853561e09524e38d64ccc1beaa194ee0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\ProgramData\cxrpj.exe"C:\ProgramData\cxrpj.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
932KB
MD52e22007d28a8046ffd2b8690668cca00
SHA1449cb0747d5ecf291fac83f1e7c6aa4275bd4aed
SHA25676d838e7e04ade0081dd4c7be6b6155e4c89d10100146173637cacdd253265c5
SHA5120eb967dd499df8bf063054d8285c62be0a42a393fb1b9af4a646e2d060279974d9e49076febfac6098a526ccaffd0f944a9e8ec2cc45142e862af1b252906c11
-
Filesize
477KB
MD571e38cb8371fa644436922e0eee6040d
SHA16e9e897cb95fd8434891e87a584f5f1b9482cae2
SHA2562c97f31658ca63791439d384a5c4488bdca89adac6c363c2cc97e5763af30db4
SHA512852954de6ce9732c6533d475ebd22f308c5659690d5197dd5865cde0ef740b40f380035baf8d9e6e38dc0541b5f16ffb01ea1560cbb89528ec4b2214c7fcc3be
-
Filesize
477KB
MD571e38cb8371fa644436922e0eee6040d
SHA16e9e897cb95fd8434891e87a584f5f1b9482cae2
SHA2562c97f31658ca63791439d384a5c4488bdca89adac6c363c2cc97e5763af30db4
SHA512852954de6ce9732c6533d475ebd22f308c5659690d5197dd5865cde0ef740b40f380035baf8d9e6e38dc0541b5f16ffb01ea1560cbb89528ec4b2214c7fcc3be
-
Filesize
454KB
MD51ab0f27a7a5da00733f78b18c5ebf9c1
SHA1d70ebfd6db5a412bdb6370cbd5e73cdc9df8ed0e
SHA25660f1ffb77057a1fbd37d64a18b0dede1a3482dc0f6f3149b6166a70686e993d2
SHA512de3404a444f7ccf9eb3e022f21f226b9a175eec4f30fb4814d54cb3530f843334f5d9d9138acfbab1f3a3d70312e3cc7c12a6614ed8674c99467fa5c6a2291ae
-
Filesize
454KB
MD51ab0f27a7a5da00733f78b18c5ebf9c1
SHA1d70ebfd6db5a412bdb6370cbd5e73cdc9df8ed0e
SHA25660f1ffb77057a1fbd37d64a18b0dede1a3482dc0f6f3149b6166a70686e993d2
SHA512de3404a444f7ccf9eb3e022f21f226b9a175eec4f30fb4814d54cb3530f843334f5d9d9138acfbab1f3a3d70312e3cc7c12a6614ed8674c99467fa5c6a2291ae
-
Filesize
454KB
MD51ab0f27a7a5da00733f78b18c5ebf9c1
SHA1d70ebfd6db5a412bdb6370cbd5e73cdc9df8ed0e
SHA25660f1ffb77057a1fbd37d64a18b0dede1a3482dc0f6f3149b6166a70686e993d2
SHA512de3404a444f7ccf9eb3e022f21f226b9a175eec4f30fb4814d54cb3530f843334f5d9d9138acfbab1f3a3d70312e3cc7c12a6614ed8674c99467fa5c6a2291ae
-
Filesize
454KB
MD51ab0f27a7a5da00733f78b18c5ebf9c1
SHA1d70ebfd6db5a412bdb6370cbd5e73cdc9df8ed0e
SHA25660f1ffb77057a1fbd37d64a18b0dede1a3482dc0f6f3149b6166a70686e993d2
SHA512de3404a444f7ccf9eb3e022f21f226b9a175eec4f30fb4814d54cb3530f843334f5d9d9138acfbab1f3a3d70312e3cc7c12a6614ed8674c99467fa5c6a2291ae
-
Filesize
454KB
MD51ab0f27a7a5da00733f78b18c5ebf9c1
SHA1d70ebfd6db5a412bdb6370cbd5e73cdc9df8ed0e
SHA25660f1ffb77057a1fbd37d64a18b0dede1a3482dc0f6f3149b6166a70686e993d2
SHA512de3404a444f7ccf9eb3e022f21f226b9a175eec4f30fb4814d54cb3530f843334f5d9d9138acfbab1f3a3d70312e3cc7c12a6614ed8674c99467fa5c6a2291ae