Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    05/11/2023, 20:10

General

  • Target

    NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe

  • Size

    200KB

  • MD5

    e5bc5da50b5fb2dcbb51656a8343aaa0

  • SHA1

    e3a4691ec64b9edea5cc9ff77399c9672fbc8ce8

  • SHA256

    9d55e8ed3273bce75776e66db1586f8ad8b2e210a2678626b5338187d5e01dbf

  • SHA512

    bb3c57a48d96007829bb0366661168763c292c018a05cdbcafc0e6c579ad59e8b370c550bdc5ed3c2f4f65b333122bc7fdf1570973407c794332d7b0078744df

  • SSDEEP

    6144:WuaH/U5fqVM4kqgQoBO+Yandhnz2SN1EAPbI:W5H/mJqgrBO+YaXCSAub

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Sets service image path in registry 2 TTPs 2 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Installs/modifies Browser Helper Object 2 TTPs 6 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Maps connected drives based on registry 3 TTPs 3 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 6 IoCs
  • Modifies registry class 46 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: LoadsDriver 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe"
    1⤵
    • Drops file in Drivers directory
    • Sets service image path in registry
    • Installs/modifies Browser Helper Object
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: LoadsDriver
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /s /c C:\Windows\system32\kakune.dll
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:2120
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\Coor.bat
      2⤵
        PID:2688

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Coor.bat

      Filesize

      178B

      MD5

      98adb2a7c09ada468798da50cc41281d

      SHA1

      5fbca442fa63b8a0c4e3b8335c5f4703537fdbf0

      SHA256

      9585d17d017628659f847ded169c8b0a9c3c3d418f6b81e4f518e8ad7c3ce1fe

      SHA512

      4ec59d5bafecb220a8228ee588682f6e77fa5e7439c060965c4fa01f285b3a30a4a7684de43d51b11acce4ecaaf94998b26fe584fb25719d9366f60c8d13864a

    • C:\Users\Admin\AppData\Local\Temp\Coor.bat

      Filesize

      178B

      MD5

      98adb2a7c09ada468798da50cc41281d

      SHA1

      5fbca442fa63b8a0c4e3b8335c5f4703537fdbf0

      SHA256

      9585d17d017628659f847ded169c8b0a9c3c3d418f6b81e4f518e8ad7c3ce1fe

      SHA512

      4ec59d5bafecb220a8228ee588682f6e77fa5e7439c060965c4fa01f285b3a30a4a7684de43d51b11acce4ecaaf94998b26fe584fb25719d9366f60c8d13864a

    • C:\Windows\SysWOW64\kakune.dll

      Filesize

      194KB

      MD5

      b67eab8e23959baee152d8d0f89a8f60

      SHA1

      cc717f1290d4b5600e6c94fb28c587f3c599e199

      SHA256

      5f5c2b5ae33b9b20e0772cd37bb4c12d2673306eecab68169cc2e8f06bb6a2f2

      SHA512

      8013b3ec95fcab3cc0b19f320471cb7db8ccfdccd8a3be0f64c98d8d4ea7ef8c90b95cf56136a4e987e7ea1ad88af7aaa94d44f569f4b835a7ef06a65a88989e

    • \Windows\SysWOW64\kakune.dll

      Filesize

      194KB

      MD5

      b67eab8e23959baee152d8d0f89a8f60

      SHA1

      cc717f1290d4b5600e6c94fb28c587f3c599e199

      SHA256

      5f5c2b5ae33b9b20e0772cd37bb4c12d2673306eecab68169cc2e8f06bb6a2f2

      SHA512

      8013b3ec95fcab3cc0b19f320471cb7db8ccfdccd8a3be0f64c98d8d4ea7ef8c90b95cf56136a4e987e7ea1ad88af7aaa94d44f569f4b835a7ef06a65a88989e

    • memory/2120-19-0x0000000010000000-0x0000000010035000-memory.dmp

      Filesize

      212KB

    • memory/2292-0-0x0000000000290000-0x0000000000310000-memory.dmp

      Filesize

      512KB

    • memory/2292-3-0x0000000000290000-0x0000000000310000-memory.dmp

      Filesize

      512KB

    • memory/2292-1-0x0000000000400000-0x00000000004D2000-memory.dmp

      Filesize

      840KB

    • memory/2292-4-0x0000000000290000-0x0000000000310000-memory.dmp

      Filesize

      512KB

    • memory/2292-30-0x0000000000400000-0x00000000004D2000-memory.dmp

      Filesize

      840KB