Analysis

  • max time kernel
    141s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    02/11/2023, 16:48

General

  • Target

    NEAS.ace83b47287c2015e1e9f15f17b930e0.exe

  • Size

    211KB

  • MD5

    ace83b47287c2015e1e9f15f17b930e0

  • SHA1

    7ca68da9fc64f7a441225e73b74b53585897b81d

  • SHA256

    715262e00ad48849bcfba51c8eaa45685a27d3b829b4b8eeece4e282925110ba

  • SHA512

    ce59b19845e6e39f67252d01cbdf28791cf242aaa71f5296ec0417f3c3e6f1e2d376df39b9458a98d955b8927ae54a1aa3491fb38ed8223e9c35b2cd483252be

  • SSDEEP

    6144:4l0n6aur7bd8TnXlKx6e5DVofZvSHzwIXsxaxk3W:7n6aurNGXuV5DVgZ2zFXsxaxL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.ace83b47287c2015e1e9f15f17b930e0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.ace83b47287c2015e1e9f15f17b930e0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\6D73.tmp\vir.bat""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save NEAS.ace83b47287c2015e1e9f15f17b930e0.exe.com -include s.dll -overwrite -nodelete
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2776
        • C:\Users\Admin\AppData\Local\Temp\6F56.tmp\mpress.exe
          "C:\Users\Admin\AppData\Local\Temp\6F56.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe6F57.tmp"
          4⤵
          • Executes dropped EXE
          PID:2544
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete
        3⤵
        • Executes dropped EXE
        PID:2900
      • C:\Windows\SysWOW64\calc.exe
        CALC.EXE
        3⤵
          PID:2304

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\6D73.tmp\vir.bat

            Filesize

            1KB

            MD5

            01c87420a4b51c19c8ad935176a4cbed

            SHA1

            1b14185109c5a30758b11aab759b05dccd0fba1d

            SHA256

            3655a893db583773b08734017a63bfea3474dc2411b92bf91db49cc216d5c91c

            SHA512

            95943c45f0e938493e966b8c98eff72fe4637d48e7bc8a84558f3bb59ee9c5e155afed56b084da7e20a4100d17d7a91654171261ea9c9590c057646c8317ac6a

          • C:\Users\Admin\AppData\Local\Temp\6D73.tmp\vir.bat

            Filesize

            1KB

            MD5

            01c87420a4b51c19c8ad935176a4cbed

            SHA1

            1b14185109c5a30758b11aab759b05dccd0fba1d

            SHA256

            3655a893db583773b08734017a63bfea3474dc2411b92bf91db49cc216d5c91c

            SHA512

            95943c45f0e938493e966b8c98eff72fe4637d48e7bc8a84558f3bb59ee9c5e155afed56b084da7e20a4100d17d7a91654171261ea9c9590c057646c8317ac6a

          • C:\Users\Admin\AppData\Local\Temp\6F56.tmp\mpress.exe

            Filesize

            100KB

            MD5

            e42b81b9636152c78ba480c1c47d3c7f

            SHA1

            66a2fca3925428ee91ad9df5b76b90b34d28e0f8

            SHA256

            7c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2

            SHA512

            4b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e

          • C:\Users\Admin\AppData\Local\Temp\6F56.tmp\mpress.exe

            Filesize

            100KB

            MD5

            e42b81b9636152c78ba480c1c47d3c7f

            SHA1

            66a2fca3925428ee91ad9df5b76b90b34d28e0f8

            SHA256

            7c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2

            SHA512

            4b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e

          • C:\Users\Admin\AppData\Local\Temp\exe6F57.tmp

            Filesize

            41KB

            MD5

            7aa367dca7be65e07b16bd69f06263e3

            SHA1

            d447739251408f8e8490a9d307927bfbe41737ce

            SHA256

            738bf50547320b0683af727ad6d430f2e7b83c846fe24f91527b7ee263bfa076

            SHA512

            d7884589d7d12a628c9e07b77b3b793fa91f67fe13563e7b072ca864e053e6b7d711852e30ae1c877576b8ad47f67d2826e8ee711e6b65a329baa57492fe31b3

          • C:\Users\Admin\AppData\Local\Temp\exe6F57.tmp

            Filesize

            41KB

            MD5

            7aa367dca7be65e07b16bd69f06263e3

            SHA1

            d447739251408f8e8490a9d307927bfbe41737ce

            SHA256

            738bf50547320b0683af727ad6d430f2e7b83c846fe24f91527b7ee263bfa076

            SHA512

            d7884589d7d12a628c9e07b77b3b793fa91f67fe13563e7b072ca864e053e6b7d711852e30ae1c877576b8ad47f67d2826e8ee711e6b65a329baa57492fe31b3

          • C:\Users\Admin\AppData\Local\Temp\exe6F57.tmp

            Filesize

            24KB

            MD5

            7cda353434725a4a3712954fd3ded290

            SHA1

            d8348e79d6bcee527743b126026367d700ddb436

            SHA256

            7e781837fa89a8ead0a14c14a7f2125a89bb7b33d2ccc358f6b8ad22924b5e86

            SHA512

            4ac257fe8e0772adc8aa1a2626153c473554c341c025959dd994100c43e2cec274e8a532e0c1b5c0ecdf463733d25a63767b995b731ce272b1c7a3ad0820b95d

          • C:\Users\Admin\AppData\Local\Temp\s.dll

            Filesize

            700KB

            MD5

            3c9568b0d86a865f9f73d9c0967cfdad

            SHA1

            3270df3e0e600f4df2c3cbc384837693a8a3a83e

            SHA256

            c7b97a001b39e17382e929aad924555f3d21886b86aed38cffd660490801d1d6

            SHA512

            bd423d1d57823b1bf6db42aeec199aa93178a9317ead85b42b60e091aaf4f73ce721bc07fda4750e112c4dccb9d87e21d5793965da9d6e92b0c5bed92c26876f

          • C:\Users\Admin\AppData\Local\Temp\u.dll

            Filesize

            700KB

            MD5

            3c9568b0d86a865f9f73d9c0967cfdad

            SHA1

            3270df3e0e600f4df2c3cbc384837693a8a3a83e

            SHA256

            c7b97a001b39e17382e929aad924555f3d21886b86aed38cffd660490801d1d6

            SHA512

            bd423d1d57823b1bf6db42aeec199aa93178a9317ead85b42b60e091aaf4f73ce721bc07fda4750e112c4dccb9d87e21d5793965da9d6e92b0c5bed92c26876f

          • C:\Users\Admin\AppData\Local\Temp\u.dll

            Filesize

            700KB

            MD5

            3c9568b0d86a865f9f73d9c0967cfdad

            SHA1

            3270df3e0e600f4df2c3cbc384837693a8a3a83e

            SHA256

            c7b97a001b39e17382e929aad924555f3d21886b86aed38cffd660490801d1d6

            SHA512

            bd423d1d57823b1bf6db42aeec199aa93178a9317ead85b42b60e091aaf4f73ce721bc07fda4750e112c4dccb9d87e21d5793965da9d6e92b0c5bed92c26876f

          • C:\Users\Admin\AppData\Local\Temp\u.dll

            Filesize

            700KB

            MD5

            3c9568b0d86a865f9f73d9c0967cfdad

            SHA1

            3270df3e0e600f4df2c3cbc384837693a8a3a83e

            SHA256

            c7b97a001b39e17382e929aad924555f3d21886b86aed38cffd660490801d1d6

            SHA512

            bd423d1d57823b1bf6db42aeec199aa93178a9317ead85b42b60e091aaf4f73ce721bc07fda4750e112c4dccb9d87e21d5793965da9d6e92b0c5bed92c26876f

          • C:\Users\Admin\AppData\Local\Temp\vir.bat

            Filesize

            1KB

            MD5

            7867d298aa81dd84157be297cf3d2c6b

            SHA1

            a7be5ffbe35724ec1c57bcf1bac281cd2ceaead4

            SHA256

            09e3a201a4c6a41172888d97276f723e20347ab340f93a502037ba1c1cee726e

            SHA512

            1ae9af113f6b27bb76fd1ea14b1fd68ead03e3725ee925154326e71fba4fc05e5ddc24328bbaa26ca5df54cc10c9fc71b63c41493605618c559d24c7b66ff185

          • C:\Users\Admin\AppData\Local\Temp\vir.bat

            Filesize

            1KB

            MD5

            06b1f7fda6af2883e229fd3c90dd3fa5

            SHA1

            7db4343ed8a75813182ee1f02efd782ee926b376

            SHA256

            62e8606d3816307ea4cae483f2fb6b51ebb99427697dc5e94662d542feaaa0b8

            SHA512

            fc6b541e5c0410ce2d4b78f828e908c651496f0e361f8393f008c07f2bbb4f2eb2b63690d87b9823c0592fb6507a19fc8fd57ec6a741be2f3e653e62e9b380f9

          • \Users\Admin\AppData\Local\Temp\6F56.tmp\mpress.exe

            Filesize

            100KB

            MD5

            e42b81b9636152c78ba480c1c47d3c7f

            SHA1

            66a2fca3925428ee91ad9df5b76b90b34d28e0f8

            SHA256

            7c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2

            SHA512

            4b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e

          • \Users\Admin\AppData\Local\Temp\6F56.tmp\mpress.exe

            Filesize

            100KB

            MD5

            e42b81b9636152c78ba480c1c47d3c7f

            SHA1

            66a2fca3925428ee91ad9df5b76b90b34d28e0f8

            SHA256

            7c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2

            SHA512

            4b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e

          • \Users\Admin\AppData\Local\Temp\u.dll

            Filesize

            700KB

            MD5

            3c9568b0d86a865f9f73d9c0967cfdad

            SHA1

            3270df3e0e600f4df2c3cbc384837693a8a3a83e

            SHA256

            c7b97a001b39e17382e929aad924555f3d21886b86aed38cffd660490801d1d6

            SHA512

            bd423d1d57823b1bf6db42aeec199aa93178a9317ead85b42b60e091aaf4f73ce721bc07fda4750e112c4dccb9d87e21d5793965da9d6e92b0c5bed92c26876f

          • \Users\Admin\AppData\Local\Temp\u.dll

            Filesize

            700KB

            MD5

            3c9568b0d86a865f9f73d9c0967cfdad

            SHA1

            3270df3e0e600f4df2c3cbc384837693a8a3a83e

            SHA256

            c7b97a001b39e17382e929aad924555f3d21886b86aed38cffd660490801d1d6

            SHA512

            bd423d1d57823b1bf6db42aeec199aa93178a9317ead85b42b60e091aaf4f73ce721bc07fda4750e112c4dccb9d87e21d5793965da9d6e92b0c5bed92c26876f

          • \Users\Admin\AppData\Local\Temp\u.dll

            Filesize

            700KB

            MD5

            3c9568b0d86a865f9f73d9c0967cfdad

            SHA1

            3270df3e0e600f4df2c3cbc384837693a8a3a83e

            SHA256

            c7b97a001b39e17382e929aad924555f3d21886b86aed38cffd660490801d1d6

            SHA512

            bd423d1d57823b1bf6db42aeec199aa93178a9317ead85b42b60e091aaf4f73ce721bc07fda4750e112c4dccb9d87e21d5793965da9d6e92b0c5bed92c26876f

          • \Users\Admin\AppData\Local\Temp\u.dll

            Filesize

            700KB

            MD5

            3c9568b0d86a865f9f73d9c0967cfdad

            SHA1

            3270df3e0e600f4df2c3cbc384837693a8a3a83e

            SHA256

            c7b97a001b39e17382e929aad924555f3d21886b86aed38cffd660490801d1d6

            SHA512

            bd423d1d57823b1bf6db42aeec199aa93178a9317ead85b42b60e091aaf4f73ce721bc07fda4750e112c4dccb9d87e21d5793965da9d6e92b0c5bed92c26876f

          • memory/1736-114-0x0000000000400000-0x00000000004BF000-memory.dmp

            Filesize

            764KB

          • memory/1736-0-0x0000000000400000-0x00000000004BF000-memory.dmp

            Filesize

            764KB

          • memory/2544-76-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/2544-71-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/2776-69-0x00000000003B0000-0x00000000003E4000-memory.dmp

            Filesize

            208KB

          • memory/2776-67-0x00000000003B0000-0x00000000003E4000-memory.dmp

            Filesize

            208KB