Analysis
-
max time kernel
140s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
04-11-2023 07:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.ca409816d71718a2b0a10a643366f000.exe
Resource
win7-20231020-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.ca409816d71718a2b0a10a643366f000.exe
Resource
win10v2004-20231023-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
NEAS.ca409816d71718a2b0a10a643366f000.exe
-
Size
37KB
-
MD5
ca409816d71718a2b0a10a643366f000
-
SHA1
532380a0297ee19d523168e8fe8bcd85a67ffb70
-
SHA256
f735347f074ff2e3ded73c3c0009c9f6dc5095bd5a9341fa2f0144d7166b0a07
-
SHA512
658c5a604cc8642af7cc79ca740e701853b548cf1fb7dba8b49cfe627532e449c3b313e756c8392871f09560f0071dd3947378feb4131beb3f3c6ba69a889a8d
-
SSDEEP
384:oPvmmRUpxPxN5hC+yX5i8uSSIMzOvu+TnI8Gymo:oHmmRUbRMzwESInFI8tm
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
NEAS.ca409816d71718a2b0a10a643366f000.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\I-Worm.GiGu = "uGiG.eXe" NEAS.ca409816d71718a2b0a10a643366f000.exe -
Drops file in System32 directory 3 IoCs
Processes:
NEAS.ca409816d71718a2b0a10a643366f000.exedescription ioc process File created C:\Windows\SysWOW64\GiGu.eXe NEAS.ca409816d71718a2b0a10a643366f000.exe File opened for modification C:\Windows\SysWOW64\GiGu.eXe NEAS.ca409816d71718a2b0a10a643366f000.exe File created C:\Windows\SysWOW64\GiGu.eml NEAS.ca409816d71718a2b0a10a643366f000.exe -
Drops file in Windows directory 2 IoCs
Processes:
NEAS.ca409816d71718a2b0a10a643366f000.exedescription ioc process File opened for modification C:\Windows\uGiG.eXe NEAS.ca409816d71718a2b0a10a643366f000.exe File created C:\Windows\uGiG.eXe NEAS.ca409816d71718a2b0a10a643366f000.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2440 2168 WerFault.exe NEAS.ca409816d71718a2b0a10a643366f000.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
NEAS.ca409816d71718a2b0a10a643366f000.exedescription pid process target process PID 2168 wrote to memory of 2440 2168 NEAS.ca409816d71718a2b0a10a643366f000.exe WerFault.exe PID 2168 wrote to memory of 2440 2168 NEAS.ca409816d71718a2b0a10a643366f000.exe WerFault.exe PID 2168 wrote to memory of 2440 2168 NEAS.ca409816d71718a2b0a10a643366f000.exe WerFault.exe PID 2168 wrote to memory of 2440 2168 NEAS.ca409816d71718a2b0a10a643366f000.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.ca409816d71718a2b0a10a643366f000.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.ca409816d71718a2b0a10a643366f000.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 1762⤵
- Program crash
PID:2440
-