Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
03-11-2023 12:38
Behavioral task
behavioral1
Sample
NEAS.d8c5dcba0144f9557cd411ef70f3b3c0.exe
Resource
win7-20231023-en
General
-
Target
NEAS.d8c5dcba0144f9557cd411ef70f3b3c0.exe
-
Size
123KB
-
MD5
d8c5dcba0144f9557cd411ef70f3b3c0
-
SHA1
51bfb70c286193f604131e83e80031b3a4e22297
-
SHA256
126ad942766d4aa10279c14c3ebe7b8911edb87542c83ea74f923583b068a112
-
SHA512
d7717705c0389f6e5371c25f74b81bbffc3ef1df84fa4360bf6a623675de561a58c89fb56c3b52cedde8a22dd8a5267d223d5620c6234bd09daf79ba58077d17
-
SSDEEP
1536:Ko6JdvxttIBcXISDPV2Mhg3GkFceersWjcd06UsfqW2vxq6Uw:iHC6D92O8n7eU06UsfUpqC
Malware Config
Extracted
urelas
112.175.88.209
112.175.88.207
112.175.88.208
Signatures
-
Deletes itself 1 IoCs
pid Process 2772 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2172 biudfw.exe -
Loads dropped DLL 1 IoCs
pid Process 1464 NEAS.d8c5dcba0144f9557cd411ef70f3b3c0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1464 wrote to memory of 2172 1464 NEAS.d8c5dcba0144f9557cd411ef70f3b3c0.exe 28 PID 1464 wrote to memory of 2172 1464 NEAS.d8c5dcba0144f9557cd411ef70f3b3c0.exe 28 PID 1464 wrote to memory of 2172 1464 NEAS.d8c5dcba0144f9557cd411ef70f3b3c0.exe 28 PID 1464 wrote to memory of 2172 1464 NEAS.d8c5dcba0144f9557cd411ef70f3b3c0.exe 28 PID 1464 wrote to memory of 2772 1464 NEAS.d8c5dcba0144f9557cd411ef70f3b3c0.exe 30 PID 1464 wrote to memory of 2772 1464 NEAS.d8c5dcba0144f9557cd411ef70f3b3c0.exe 30 PID 1464 wrote to memory of 2772 1464 NEAS.d8c5dcba0144f9557cd411ef70f3b3c0.exe 30 PID 1464 wrote to memory of 2772 1464 NEAS.d8c5dcba0144f9557cd411ef70f3b3c0.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d8c5dcba0144f9557cd411ef70f3b3c0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d8c5dcba0144f9557cd411ef70f3b3c0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
PID:2172
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD51e61bff1253d118467406e44afb86cf9
SHA1b954cf737fa60d8923663b8e764cc6fa2ab02cf8
SHA256472db4ab27a459b36a43ac498ce593a90c04355a831c7016b8372840a48ed94d
SHA51200307982bf5d27e743b05324cc2602ebf3ae4bd56884e4dbf49ef34b48b2738126f83910ac017466212ed9ee964866c13943b03d534d256dd60b41d40d033c94
-
Filesize
512B
MD5d8b6fb23d659bed3f6b1cf40a104e95a
SHA107c9c74af6b0fe9b78bb1b3aed5bdc1e0b5de952
SHA256f28d96334bf66f634f899c800b4d5c6195bcf407cb073761f8a4f30a4061f136
SHA512e841cd9283c63a92395b4221492e2ae6b06d9c4108fcbbfe7d8a7928cfca405c14c0634a6388a4f18da3db611696ea797f9b825ed314d1640a17aa767593e412
-
Filesize
284B
MD5813b404a0a8befc17907e2845984a78e
SHA13005105e0371062e16092b41a4a83baa1499544f
SHA25629c8cc06b22c1114aa0caf536d3746b5699b81362fa9b27701490e4ac0b9b4cc
SHA5125b95e2d185825b327f5d0a211e2edf5ffca7438b5472032bf6c340dbb11364dcaf0fe406c965ffc7cbbe53045294aba391ff5b94c56afcb3b1f0a0ac1bce728d
-
Filesize
284B
MD5813b404a0a8befc17907e2845984a78e
SHA13005105e0371062e16092b41a4a83baa1499544f
SHA25629c8cc06b22c1114aa0caf536d3746b5699b81362fa9b27701490e4ac0b9b4cc
SHA5125b95e2d185825b327f5d0a211e2edf5ffca7438b5472032bf6c340dbb11364dcaf0fe406c965ffc7cbbe53045294aba391ff5b94c56afcb3b1f0a0ac1bce728d
-
Filesize
123KB
MD51e61bff1253d118467406e44afb86cf9
SHA1b954cf737fa60d8923663b8e764cc6fa2ab02cf8
SHA256472db4ab27a459b36a43ac498ce593a90c04355a831c7016b8372840a48ed94d
SHA51200307982bf5d27e743b05324cc2602ebf3ae4bd56884e4dbf49ef34b48b2738126f83910ac017466212ed9ee964866c13943b03d534d256dd60b41d40d033c94