Analysis
-
max time kernel
122s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
02-11-2023 21:57
Behavioral task
behavioral1
Sample
NEAS.ba5b02757abb9900da0ebf8be2828090_JC.exe
Resource
win7-20231025-en
General
-
Target
NEAS.ba5b02757abb9900da0ebf8be2828090_JC.exe
-
Size
205KB
-
MD5
ba5b02757abb9900da0ebf8be2828090
-
SHA1
3865b529b25471157c69fa37ae6b276ff5ef4664
-
SHA256
56d8aa82794138643a9ee8e6278834e4f1710f0f42e9830f30d0a21a19b1320c
-
SHA512
17f9fc1713b7674e77f5467ff371a541f39c53e7dcfbea46992b5f651a2cddfa3c3c2cbbba55c141a26396fe8923974b838ccd178ea216e9f492df8f8337068b
-
SSDEEP
3072:fXKKeWcNEzT5zvfpmGYoUyDpwPHHaFeo66bsDl8NLS:fXKK/cNcT5wDyDpCH6FL66bsDlyS
Malware Config
Extracted
urelas
112.175.88.208
112.175.88.207
Signatures
-
Deletes itself 1 IoCs
pid Process 2568 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1656 hongdo.exe -
Loads dropped DLL 1 IoCs
pid Process 2380 NEAS.ba5b02757abb9900da0ebf8be2828090_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2380 wrote to memory of 1656 2380 NEAS.ba5b02757abb9900da0ebf8be2828090_JC.exe 28 PID 2380 wrote to memory of 1656 2380 NEAS.ba5b02757abb9900da0ebf8be2828090_JC.exe 28 PID 2380 wrote to memory of 1656 2380 NEAS.ba5b02757abb9900da0ebf8be2828090_JC.exe 28 PID 2380 wrote to memory of 1656 2380 NEAS.ba5b02757abb9900da0ebf8be2828090_JC.exe 28 PID 2380 wrote to memory of 2568 2380 NEAS.ba5b02757abb9900da0ebf8be2828090_JC.exe 29 PID 2380 wrote to memory of 2568 2380 NEAS.ba5b02757abb9900da0ebf8be2828090_JC.exe 29 PID 2380 wrote to memory of 2568 2380 NEAS.ba5b02757abb9900da0ebf8be2828090_JC.exe 29 PID 2380 wrote to memory of 2568 2380 NEAS.ba5b02757abb9900da0ebf8be2828090_JC.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.ba5b02757abb9900da0ebf8be2828090_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.ba5b02757abb9900da0ebf8be2828090_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\hongdo.exe"C:\Users\Admin\AppData\Local\Temp\hongdo.exe"2⤵
- Executes dropped EXE
PID:1656
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD5ed5fb4240b0cd154c97f17af7109455d
SHA17ca7f753e40b8213ec950bff3b290c784a37a8cd
SHA256058214bcd4b7fcc070af9a9ca3222a5df1f0e046037a3e9f516b6e158bac1d96
SHA5121e51f8af2a8577aa6371c091efd2f3dff50c36aeb5d97d0375604e1087ccb0f69f309dbe2b31268b35c3f07490849959071ec4fa409b7e1f195f6a04bab266dc
-
Filesize
205KB
MD5455940a037d21bc6ce0131e1bc168acd
SHA1b5a6f6c12d7562e9df46bce10f7f5c37b40a0f1a
SHA25625c997305c72f7dfed1148dd31c11cd1cb9b796fe48babb76022609a6f561d00
SHA512fc07260a76573decf826311f47f480e620744194a3520208cb5d6b7cd87e0c11b3eabf7e99b7ccfbfc87dafc3cc9f2bdbd6d6f195eb35c92474304d95859d0fd
-
Filesize
290B
MD552a2d60be64ddd99597616edc045d9fd
SHA1e0e2ee7356b204f2b174f6e02866361a7274508a
SHA2568c802eac1b94b4969a8a398cd1cd8636e5bb7b170c00cdf28de8d36adcc2ddea
SHA512d4b4e2913034587e771aebec10601fcf5cd9246a0dbbc97b2d7f3408d5475d00d5c7e4b2266884c3f32e23439d5cf020dcb60341dcecc86a597daf1f0cb8d11c
-
Filesize
290B
MD552a2d60be64ddd99597616edc045d9fd
SHA1e0e2ee7356b204f2b174f6e02866361a7274508a
SHA2568c802eac1b94b4969a8a398cd1cd8636e5bb7b170c00cdf28de8d36adcc2ddea
SHA512d4b4e2913034587e771aebec10601fcf5cd9246a0dbbc97b2d7f3408d5475d00d5c7e4b2266884c3f32e23439d5cf020dcb60341dcecc86a597daf1f0cb8d11c
-
Filesize
205KB
MD5455940a037d21bc6ce0131e1bc168acd
SHA1b5a6f6c12d7562e9df46bce10f7f5c37b40a0f1a
SHA25625c997305c72f7dfed1148dd31c11cd1cb9b796fe48babb76022609a6f561d00
SHA512fc07260a76573decf826311f47f480e620744194a3520208cb5d6b7cd87e0c11b3eabf7e99b7ccfbfc87dafc3cc9f2bdbd6d6f195eb35c92474304d95859d0fd