Analysis

  • max time kernel
    179s
  • max time network
    197s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    02/11/2023, 21:24

General

  • Target

    NEAS.e8b5d05a4e47641da0f950dbb1942bd0_JC.exe

  • Size

    287KB

  • MD5

    e8b5d05a4e47641da0f950dbb1942bd0

  • SHA1

    3ac752ec4ad6f6819f14c88edbee2c204f2a9a7d

  • SHA256

    65bd1362d07966c52d70f287ac70732bd38c24fb6ea9c22d2500926c2a779f0d

  • SHA512

    de875cfc94ab20279ad93b7b3a6452de37c4b59944fe525401f24693d8e1ad1b890118bce831e81e73ff2018b6bcfe79bdd61b5fd93b1b25efa7b8095a20fcc0

  • SSDEEP

    6144:PDJTOrBBx22Cswe0YS1EMETItRp6NZXC5niAAr1nWyrRu8yXyLo+xVawofIkc:PDJTOh2jre81lET0yZXCBiAArpD1uwok

Malware Config

Signatures

  • Blocklisted process makes network request 7 IoCs
  • ASPack v2.12-2.42 9 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.e8b5d05a4e47641da0f950dbb1942bd0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.e8b5d05a4e47641da0f950dbb1942bd0_JC.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1036
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c ping 127.0.0.1 -n 2&C:\Users\Admin\AppData\Local\Temp\\unxjw.exe "C:\Users\Admin\AppData\Local\Temp\NEAS.e8b5d05a4e47641da0f950dbb1942bd0_JC.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 2
        3⤵
        • Runs ping.exe
        PID:2752
      • C:\Users\Admin\AppData\Local\Temp\unxjw.exe
        C:\Users\Admin\AppData\Local\Temp\\unxjw.exe "C:\Users\Admin\AppData\Local\Temp\NEAS.e8b5d05a4e47641da0f950dbb1942bd0_JC.exe"
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2764
        • \??\c:\windows\SysWOW64\rundll32.exe
          c:\windows\system32\rundll32.exe "c:\Program Files\ksriu\qurvs.dll",method C:\Users\Admin\AppData\Local\Temp\unxjw.exe
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Adds Run key to start application
          • Enumerates connected drives
          • Writes to the Master Boot Record (MBR)
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\unxjw.exe

    Filesize

    287KB

    MD5

    9be15b6882cf198c6dc028bf5aa87de9

    SHA1

    d2a28413690fc6e9ac7509e9aaa91641d791b1cb

    SHA256

    8d50a1a9b6510f57bdf8a9bca03be0e92438f91a37716d83cf742eae8561bfb9

    SHA512

    401091793420ee76097bee3c23259e808ecc5de34e1b7fbd9af323d27d64f2e45b987bc1a811f865ac95f2a7d232dab499fca7feadd94bae1a00ab360b41c925

  • C:\Users\Admin\AppData\Local\Temp\unxjw.exe

    Filesize

    287KB

    MD5

    9be15b6882cf198c6dc028bf5aa87de9

    SHA1

    d2a28413690fc6e9ac7509e9aaa91641d791b1cb

    SHA256

    8d50a1a9b6510f57bdf8a9bca03be0e92438f91a37716d83cf742eae8561bfb9

    SHA512

    401091793420ee76097bee3c23259e808ecc5de34e1b7fbd9af323d27d64f2e45b987bc1a811f865ac95f2a7d232dab499fca7feadd94bae1a00ab360b41c925

  • \??\c:\Program Files\ksriu\qurvs.dll

    Filesize

    245KB

    MD5

    620fb8a410c5b5966e209a4d24ace6ab

    SHA1

    36b0c5ac4dae626cc158e0834ba8beba5b118e83

    SHA256

    bebcee614582f9b640377874071ff6a0673c41c40cfad5448d30174236c93470

    SHA512

    fa3b3d7566d58ecc267edc14f90c000295a000e79ca78759eff97760e42c38c3fcaa9802f1f3875d40f26b5dd1a921e369948b445c42f8d2c219e8c1854ede67

  • \Program Files\ksriu\qurvs.dll

    Filesize

    245KB

    MD5

    620fb8a410c5b5966e209a4d24ace6ab

    SHA1

    36b0c5ac4dae626cc158e0834ba8beba5b118e83

    SHA256

    bebcee614582f9b640377874071ff6a0673c41c40cfad5448d30174236c93470

    SHA512

    fa3b3d7566d58ecc267edc14f90c000295a000e79ca78759eff97760e42c38c3fcaa9802f1f3875d40f26b5dd1a921e369948b445c42f8d2c219e8c1854ede67

  • \Program Files\ksriu\qurvs.dll

    Filesize

    245KB

    MD5

    620fb8a410c5b5966e209a4d24ace6ab

    SHA1

    36b0c5ac4dae626cc158e0834ba8beba5b118e83

    SHA256

    bebcee614582f9b640377874071ff6a0673c41c40cfad5448d30174236c93470

    SHA512

    fa3b3d7566d58ecc267edc14f90c000295a000e79ca78759eff97760e42c38c3fcaa9802f1f3875d40f26b5dd1a921e369948b445c42f8d2c219e8c1854ede67

  • \Program Files\ksriu\qurvs.dll

    Filesize

    245KB

    MD5

    620fb8a410c5b5966e209a4d24ace6ab

    SHA1

    36b0c5ac4dae626cc158e0834ba8beba5b118e83

    SHA256

    bebcee614582f9b640377874071ff6a0673c41c40cfad5448d30174236c93470

    SHA512

    fa3b3d7566d58ecc267edc14f90c000295a000e79ca78759eff97760e42c38c3fcaa9802f1f3875d40f26b5dd1a921e369948b445c42f8d2c219e8c1854ede67

  • \Program Files\ksriu\qurvs.dll

    Filesize

    245KB

    MD5

    620fb8a410c5b5966e209a4d24ace6ab

    SHA1

    36b0c5ac4dae626cc158e0834ba8beba5b118e83

    SHA256

    bebcee614582f9b640377874071ff6a0673c41c40cfad5448d30174236c93470

    SHA512

    fa3b3d7566d58ecc267edc14f90c000295a000e79ca78759eff97760e42c38c3fcaa9802f1f3875d40f26b5dd1a921e369948b445c42f8d2c219e8c1854ede67

  • \Users\Admin\AppData\Local\Temp\unxjw.exe

    Filesize

    287KB

    MD5

    9be15b6882cf198c6dc028bf5aa87de9

    SHA1

    d2a28413690fc6e9ac7509e9aaa91641d791b1cb

    SHA256

    8d50a1a9b6510f57bdf8a9bca03be0e92438f91a37716d83cf742eae8561bfb9

    SHA512

    401091793420ee76097bee3c23259e808ecc5de34e1b7fbd9af323d27d64f2e45b987bc1a811f865ac95f2a7d232dab499fca7feadd94bae1a00ab360b41c925

  • \Users\Admin\AppData\Local\Temp\unxjw.exe

    Filesize

    287KB

    MD5

    9be15b6882cf198c6dc028bf5aa87de9

    SHA1

    d2a28413690fc6e9ac7509e9aaa91641d791b1cb

    SHA256

    8d50a1a9b6510f57bdf8a9bca03be0e92438f91a37716d83cf742eae8561bfb9

    SHA512

    401091793420ee76097bee3c23259e808ecc5de34e1b7fbd9af323d27d64f2e45b987bc1a811f865ac95f2a7d232dab499fca7feadd94bae1a00ab360b41c925

  • memory/1036-4-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/1036-1-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/1036-2-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/1036-0-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/2720-18-0x0000000010000000-0x0000000010061000-memory.dmp

    Filesize

    388KB

  • memory/2720-33-0x0000000010000000-0x0000000010061000-memory.dmp

    Filesize

    388KB

  • memory/2720-21-0x0000000010000000-0x0000000010061000-memory.dmp

    Filesize

    388KB

  • memory/2720-23-0x0000000010000000-0x0000000010061000-memory.dmp

    Filesize

    388KB

  • memory/2720-25-0x0000000010000000-0x0000000010061000-memory.dmp

    Filesize

    388KB

  • memory/2720-27-0x0000000010000000-0x0000000010061000-memory.dmp

    Filesize

    388KB

  • memory/2720-43-0x0000000010000000-0x0000000010061000-memory.dmp

    Filesize

    388KB

  • memory/2720-42-0x0000000010000000-0x0000000010061000-memory.dmp

    Filesize

    388KB

  • memory/2720-40-0x0000000010000000-0x0000000010061000-memory.dmp

    Filesize

    388KB

  • memory/2720-29-0x0000000010000000-0x0000000010061000-memory.dmp

    Filesize

    388KB

  • memory/2720-19-0x0000000010000000-0x0000000010061000-memory.dmp

    Filesize

    388KB

  • memory/2764-9-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/2764-10-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/2764-12-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB