Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
03/11/2023, 13:38
Behavioral task
behavioral1
Sample
NEAS.80732dad0cd711308fb80c593e1b4a40.exe
Resource
win7-20231020-en
General
-
Target
NEAS.80732dad0cd711308fb80c593e1b4a40.exe
-
Size
167KB
-
MD5
80732dad0cd711308fb80c593e1b4a40
-
SHA1
59c210127a5037d54af202cb701843ec53d9a433
-
SHA256
046703b8d333865f1ab97bc161df0cca8472388c6de9f817152ecfae051bb0e0
-
SHA512
d5bcb62a8b0e62761249ad5c4c958ec71282eaca2fe898200d9e7c9758b13f882dab606641911383d7b5e059ccd4ec9e8d1e68362ca03aedd2773c8945068543
-
SSDEEP
3072:w9cZC4zU5jeLX7RxV1w3YS0S+5u5kLpRW:wcZC4zU5aL1oYS015jLp8
Malware Config
Extracted
urelas
121.88.5.184
Signatures
-
Deletes itself 1 IoCs
pid Process 2992 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1496 shoste.exe -
Loads dropped DLL 1 IoCs
pid Process 2508 NEAS.80732dad0cd711308fb80c593e1b4a40.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2508 wrote to memory of 1496 2508 NEAS.80732dad0cd711308fb80c593e1b4a40.exe 28 PID 2508 wrote to memory of 1496 2508 NEAS.80732dad0cd711308fb80c593e1b4a40.exe 28 PID 2508 wrote to memory of 1496 2508 NEAS.80732dad0cd711308fb80c593e1b4a40.exe 28 PID 2508 wrote to memory of 1496 2508 NEAS.80732dad0cd711308fb80c593e1b4a40.exe 28 PID 2508 wrote to memory of 2992 2508 NEAS.80732dad0cd711308fb80c593e1b4a40.exe 29 PID 2508 wrote to memory of 2992 2508 NEAS.80732dad0cd711308fb80c593e1b4a40.exe 29 PID 2508 wrote to memory of 2992 2508 NEAS.80732dad0cd711308fb80c593e1b4a40.exe 29 PID 2508 wrote to memory of 2992 2508 NEAS.80732dad0cd711308fb80c593e1b4a40.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.80732dad0cd711308fb80c593e1b4a40.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.80732dad0cd711308fb80c593e1b4a40.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\shoste.exe"C:\Users\Admin\AppData\Local\Temp\shoste.exe"2⤵
- Executes dropped EXE
PID:1496
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD5b80dc91d4b924877734b14d634f61fa4
SHA140ab1aceaa4d50e11a7b7b83a9fa0a6eea915479
SHA256b0fe1befbd7725c7e2b7cd6de946a4308b72f155676a2c7d41782cc774d4ddd1
SHA512597008a541ee766266f05f9a8d7801ac86a1b59acee9dd6fcd8d227923a2da9ce805d89df707dd05d93741c65317b44c92e9def1e3332175ea378cecc731de77
-
Filesize
284B
MD5a85328021c167e95e38659b239aac214
SHA12d42356e648e2a4215a9ac33cba63051f725b784
SHA256bd31bf2fbc9374e80020751263013dfa40b89d802179a23155254ebbcee0e124
SHA512eaa9c83c36564ba869873e23e4756f05da9ee45891b6d531488494d19283d93231693543b998754ac37c72ae51c86a2a5846e5be0fb5c7a3897421a094404842
-
Filesize
284B
MD5a85328021c167e95e38659b239aac214
SHA12d42356e648e2a4215a9ac33cba63051f725b784
SHA256bd31bf2fbc9374e80020751263013dfa40b89d802179a23155254ebbcee0e124
SHA512eaa9c83c36564ba869873e23e4756f05da9ee45891b6d531488494d19283d93231693543b998754ac37c72ae51c86a2a5846e5be0fb5c7a3897421a094404842
-
Filesize
167KB
MD5b8a9db890dbd2d3fa4ef23127f92b921
SHA1444c0d61a6e15ea69c7f350b678068c12289d297
SHA256cd55f45a858a9ba600d2e10eb0eae9762e7bf9ba18d9958b8a7a19104290bc9e
SHA512e2751f21329b8566a8397fdc7b86a4e3fdc562e43b3c6716b09b4911efa5abd2dcac199d2bc8dbed408a217af2a2c36be8adc54bf2fb532448c84c9a63beb579
-
Filesize
167KB
MD5b8a9db890dbd2d3fa4ef23127f92b921
SHA1444c0d61a6e15ea69c7f350b678068c12289d297
SHA256cd55f45a858a9ba600d2e10eb0eae9762e7bf9ba18d9958b8a7a19104290bc9e
SHA512e2751f21329b8566a8397fdc7b86a4e3fdc562e43b3c6716b09b4911efa5abd2dcac199d2bc8dbed408a217af2a2c36be8adc54bf2fb532448c84c9a63beb579