Analysis

  • max time kernel
    163s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    03-11-2023 09:23

General

  • Target

    NEAS.0db867b2a387b55ddcd946a826108730.exe

  • Size

    204KB

  • MD5

    0db867b2a387b55ddcd946a826108730

  • SHA1

    b0f8b59bd119e9f4f6a2237018c0b1629ad9e709

  • SHA256

    85115e143843d73112f12a024535f34df96dbfff43bd762aacba051e8ecfb636

  • SHA512

    b6ac676077056f3803f999110c03619afcf764e8c17fb4e842b71d0d860ede32a1f6d9521025b29c538b17891d4155a35cf35caa0700eb4bdcc27d6707416033

  • SSDEEP

    3072:Hm6W8Eu40tQ9nLHbB9W0c1TqECzR/mkSYGrl9ymgYUWqj:GPdZ4QxL7B9W0c1RCzR/fSmlz

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.0db867b2a387b55ddcd946a826108730.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.0db867b2a387b55ddcd946a826108730.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Users\Admin\joeabim.exe
      "C:\Users\Admin\joeabim.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\joeabim.exe

    Filesize

    204KB

    MD5

    18623499f82885e503bf40f16bec028e

    SHA1

    432c358aa17a2d77960729761a2f345a8f896657

    SHA256

    87cc6e6a2bf868f2723a5bfe2b6b4407ff5770842b0ec45fc0976979ac931e8e

    SHA512

    667fca70cecdbe119c12bb3a523090904a93bcc9fc1173eedce89790a079d33970ff32f9897d0861389b441f7aaaaa0fa6f3646202d0a21a032424cf3767da85

  • C:\Users\Admin\joeabim.exe

    Filesize

    204KB

    MD5

    18623499f82885e503bf40f16bec028e

    SHA1

    432c358aa17a2d77960729761a2f345a8f896657

    SHA256

    87cc6e6a2bf868f2723a5bfe2b6b4407ff5770842b0ec45fc0976979ac931e8e

    SHA512

    667fca70cecdbe119c12bb3a523090904a93bcc9fc1173eedce89790a079d33970ff32f9897d0861389b441f7aaaaa0fa6f3646202d0a21a032424cf3767da85

  • C:\Users\Admin\joeabim.exe

    Filesize

    204KB

    MD5

    18623499f82885e503bf40f16bec028e

    SHA1

    432c358aa17a2d77960729761a2f345a8f896657

    SHA256

    87cc6e6a2bf868f2723a5bfe2b6b4407ff5770842b0ec45fc0976979ac931e8e

    SHA512

    667fca70cecdbe119c12bb3a523090904a93bcc9fc1173eedce89790a079d33970ff32f9897d0861389b441f7aaaaa0fa6f3646202d0a21a032424cf3767da85

  • \Users\Admin\joeabim.exe

    Filesize

    204KB

    MD5

    18623499f82885e503bf40f16bec028e

    SHA1

    432c358aa17a2d77960729761a2f345a8f896657

    SHA256

    87cc6e6a2bf868f2723a5bfe2b6b4407ff5770842b0ec45fc0976979ac931e8e

    SHA512

    667fca70cecdbe119c12bb3a523090904a93bcc9fc1173eedce89790a079d33970ff32f9897d0861389b441f7aaaaa0fa6f3646202d0a21a032424cf3767da85

  • \Users\Admin\joeabim.exe

    Filesize

    204KB

    MD5

    18623499f82885e503bf40f16bec028e

    SHA1

    432c358aa17a2d77960729761a2f345a8f896657

    SHA256

    87cc6e6a2bf868f2723a5bfe2b6b4407ff5770842b0ec45fc0976979ac931e8e

    SHA512

    667fca70cecdbe119c12bb3a523090904a93bcc9fc1173eedce89790a079d33970ff32f9897d0861389b441f7aaaaa0fa6f3646202d0a21a032424cf3767da85