Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
05-11-2023 22:43
Behavioral task
behavioral1
Sample
NEAS.d03af095074486e27cff72e93bbcfb30.exe
Resource
win7-20231023-en
General
-
Target
NEAS.d03af095074486e27cff72e93bbcfb30.exe
-
Size
166KB
-
MD5
d03af095074486e27cff72e93bbcfb30
-
SHA1
94e04ca9a5da0ae09cb8702e6a46640f53e3d290
-
SHA256
d62f7cc25b27ab6220740f062e147be5bb78d0762d80f0aef60bc5f91403b9f1
-
SHA512
5cff95c8d18a33e2aa04edbfa035c1d2ad656b06d95536b8f88a47940300b7ee956f01fba13fdfd322d4d8c57323dad087042217ee8071efbe2910b3bf01a139
-
SSDEEP
1536:eADO0Wbt1931D2P7BWLQ4zR4LUKMcPHFE3HP/GTW65CGEEHpWYPyI:eADO0Wc7UJ6LZMaHLW65DE8pWM5
Malware Config
Extracted
urelas
112.175.88.208
112.175.88.207
Signatures
-
Deletes itself 1 IoCs
pid Process 2980 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2060 huter.exe -
Loads dropped DLL 1 IoCs
pid Process 2136 NEAS.d03af095074486e27cff72e93bbcfb30.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2060 2136 NEAS.d03af095074486e27cff72e93bbcfb30.exe 28 PID 2136 wrote to memory of 2060 2136 NEAS.d03af095074486e27cff72e93bbcfb30.exe 28 PID 2136 wrote to memory of 2060 2136 NEAS.d03af095074486e27cff72e93bbcfb30.exe 28 PID 2136 wrote to memory of 2060 2136 NEAS.d03af095074486e27cff72e93bbcfb30.exe 28 PID 2136 wrote to memory of 2980 2136 NEAS.d03af095074486e27cff72e93bbcfb30.exe 29 PID 2136 wrote to memory of 2980 2136 NEAS.d03af095074486e27cff72e93bbcfb30.exe 29 PID 2136 wrote to memory of 2980 2136 NEAS.d03af095074486e27cff72e93bbcfb30.exe 29 PID 2136 wrote to memory of 2980 2136 NEAS.d03af095074486e27cff72e93bbcfb30.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d03af095074486e27cff72e93bbcfb30.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d03af095074486e27cff72e93bbcfb30.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
PID:2060
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD55e704b5f881109f8bbed7ad82da7d387
SHA1b2d1b752096acb6d34dec98309bef7d6d2a4ffd0
SHA256cd008a2663d30d350f996ca092703616ef5500c0df20b1798ac99589a5c6964e
SHA5128bc14bef2e186dc2106326a220fc88a00499f96750ff953b81944a058d75b99e8ca48fa327ff490ffa9cbf790f6d613c7804ec27cac8880a3dc4d9f177dd80cd
-
Filesize
166KB
MD5c1991bb61d047f3bf9b35cae302d6657
SHA1d911962125b91bdcb1da1ff0233691fbaa596b9e
SHA256901cf497707b5457640d34af953d9b52f8dd132b75b0ccaefd38f3985bdb36de
SHA512941b40035612c7fbbf32675fd09e371c91208b053e6ab454356d817308a2c303d018f4646c88ca2f8a51139633484da07993f7cb2e7c4fd6bc5174864d853fad
-
Filesize
284B
MD5a374a32f17e029ac79b8ea191b5d40ac
SHA10aab73982315ee553d3210d330306ed1fce29b93
SHA256b970d3dd2ab52e512e1a76c224424f32c8f175fa25fe2e8eeba5b7733b8a8225
SHA5122ecbd39347fb4d5ff01ac186ec3ffccb7e198b930e6f9d8e753a6225bff1cc9aba06f2dcf1bde98da21e2b2fa12013a3a28a46adfec464b6cea7a6ee232a2572
-
Filesize
284B
MD5a374a32f17e029ac79b8ea191b5d40ac
SHA10aab73982315ee553d3210d330306ed1fce29b93
SHA256b970d3dd2ab52e512e1a76c224424f32c8f175fa25fe2e8eeba5b7733b8a8225
SHA5122ecbd39347fb4d5ff01ac186ec3ffccb7e198b930e6f9d8e753a6225bff1cc9aba06f2dcf1bde98da21e2b2fa12013a3a28a46adfec464b6cea7a6ee232a2572
-
Filesize
166KB
MD5c1991bb61d047f3bf9b35cae302d6657
SHA1d911962125b91bdcb1da1ff0233691fbaa596b9e
SHA256901cf497707b5457640d34af953d9b52f8dd132b75b0ccaefd38f3985bdb36de
SHA512941b40035612c7fbbf32675fd09e371c91208b053e6ab454356d817308a2c303d018f4646c88ca2f8a51139633484da07993f7cb2e7c4fd6bc5174864d853fad