Analysis
-
max time kernel
121s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
03/11/2023, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.5dace556b4a337af180d5751db9345e0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.5dace556b4a337af180d5751db9345e0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.5dace556b4a337af180d5751db9345e0.exe
-
Size
272KB
-
MD5
5dace556b4a337af180d5751db9345e0
-
SHA1
1aea82a318d80df636ce0a875cdfef8c59222eae
-
SHA256
a2e8ad9b2ea51549b8584f91849e1f812732b0d39322cc924691ab367ad2f8ff
-
SHA512
c15146af12402fbb1604afbc08c73be982490e05aae83fb28cc32b020d7a5753cd93f27e250ca78c4aa8eb3e7c315f42a5d1f6d48e8bbf19b2abe542aabadf0d
-
SSDEEP
6144:RsjiQ+u5HAPkbZePJDmlI/+dfkIOwgccXYJcmI3cvHQOFZayUa/nM2:SjiQ+u5HAPk9EUoYJcmym0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1612 xeusua.exe -
Loads dropped DLL 5 IoCs
pid Process 2276 NEAS.5dace556b4a337af180d5751db9345e0.exe 2276 NEAS.5dace556b4a337af180d5751db9345e0.exe 2444 WerFault.exe 2444 WerFault.exe 2444 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2444 1612 WerFault.exe 28 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2276 NEAS.5dace556b4a337af180d5751db9345e0.exe 1612 xeusua.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1612 2276 NEAS.5dace556b4a337af180d5751db9345e0.exe 28 PID 2276 wrote to memory of 1612 2276 NEAS.5dace556b4a337af180d5751db9345e0.exe 28 PID 2276 wrote to memory of 1612 2276 NEAS.5dace556b4a337af180d5751db9345e0.exe 28 PID 2276 wrote to memory of 1612 2276 NEAS.5dace556b4a337af180d5751db9345e0.exe 28 PID 1612 wrote to memory of 2444 1612 xeusua.exe 29 PID 1612 wrote to memory of 2444 1612 xeusua.exe 29 PID 1612 wrote to memory of 2444 1612 xeusua.exe 29 PID 1612 wrote to memory of 2444 1612 xeusua.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5dace556b4a337af180d5751db9345e0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5dace556b4a337af180d5751db9345e0.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\xeusua.exe"C:\Users\Admin\xeusua.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1612 -s 1883⤵
- Loads dropped DLL
- Program crash
PID:2444
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD5cd434a91a28ddd4b02b01308547917e6
SHA1b37cefc8bc091e47d1980d85bc55f2a1df98e794
SHA256ad5490f3ee0554ada7d64d306c48c1f2dcf76e7a4a246438d7d9ae20c4d8a94a
SHA51252c3eaa660f31787322080233aea97ca891d89274cd5bed930380c03f5aee94e4a702e5f12b35b9a5d33b5d53dfd32a0e0c2f31eecfc845511e5a5456e7eeb9c
-
Filesize
272KB
MD5cd434a91a28ddd4b02b01308547917e6
SHA1b37cefc8bc091e47d1980d85bc55f2a1df98e794
SHA256ad5490f3ee0554ada7d64d306c48c1f2dcf76e7a4a246438d7d9ae20c4d8a94a
SHA51252c3eaa660f31787322080233aea97ca891d89274cd5bed930380c03f5aee94e4a702e5f12b35b9a5d33b5d53dfd32a0e0c2f31eecfc845511e5a5456e7eeb9c
-
Filesize
272KB
MD5cd434a91a28ddd4b02b01308547917e6
SHA1b37cefc8bc091e47d1980d85bc55f2a1df98e794
SHA256ad5490f3ee0554ada7d64d306c48c1f2dcf76e7a4a246438d7d9ae20c4d8a94a
SHA51252c3eaa660f31787322080233aea97ca891d89274cd5bed930380c03f5aee94e4a702e5f12b35b9a5d33b5d53dfd32a0e0c2f31eecfc845511e5a5456e7eeb9c
-
Filesize
272KB
MD5cd434a91a28ddd4b02b01308547917e6
SHA1b37cefc8bc091e47d1980d85bc55f2a1df98e794
SHA256ad5490f3ee0554ada7d64d306c48c1f2dcf76e7a4a246438d7d9ae20c4d8a94a
SHA51252c3eaa660f31787322080233aea97ca891d89274cd5bed930380c03f5aee94e4a702e5f12b35b9a5d33b5d53dfd32a0e0c2f31eecfc845511e5a5456e7eeb9c
-
Filesize
272KB
MD5cd434a91a28ddd4b02b01308547917e6
SHA1b37cefc8bc091e47d1980d85bc55f2a1df98e794
SHA256ad5490f3ee0554ada7d64d306c48c1f2dcf76e7a4a246438d7d9ae20c4d8a94a
SHA51252c3eaa660f31787322080233aea97ca891d89274cd5bed930380c03f5aee94e4a702e5f12b35b9a5d33b5d53dfd32a0e0c2f31eecfc845511e5a5456e7eeb9c
-
Filesize
272KB
MD5cd434a91a28ddd4b02b01308547917e6
SHA1b37cefc8bc091e47d1980d85bc55f2a1df98e794
SHA256ad5490f3ee0554ada7d64d306c48c1f2dcf76e7a4a246438d7d9ae20c4d8a94a
SHA51252c3eaa660f31787322080233aea97ca891d89274cd5bed930380c03f5aee94e4a702e5f12b35b9a5d33b5d53dfd32a0e0c2f31eecfc845511e5a5456e7eeb9c
-
Filesize
272KB
MD5cd434a91a28ddd4b02b01308547917e6
SHA1b37cefc8bc091e47d1980d85bc55f2a1df98e794
SHA256ad5490f3ee0554ada7d64d306c48c1f2dcf76e7a4a246438d7d9ae20c4d8a94a
SHA51252c3eaa660f31787322080233aea97ca891d89274cd5bed930380c03f5aee94e4a702e5f12b35b9a5d33b5d53dfd32a0e0c2f31eecfc845511e5a5456e7eeb9c