Analysis

  • max time kernel
    239s
  • max time network
    252s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2023, 17:39

General

  • Target

    NEAS.5f0a7d1c2a396f2aa7effc6c9d438450.exe

  • Size

    364KB

  • MD5

    5f0a7d1c2a396f2aa7effc6c9d438450

  • SHA1

    dbcec39889c9c0fc46ff19b3e388896905189719

  • SHA256

    a2f0563bd718ba2dd2cb630a5f20ade092f42cd6df4bdcd83abaeee3b3ac5cb6

  • SHA512

    c0e308c4b39e1342d278815580cc19aad3b08b0cd527f407b9ef7454c36c485acfbd3c019e3d8e90b6c81e9c4488f77fb11e2ab7945971d71e3ef2cf0f44d24f

  • SSDEEP

    6144:XrhEcXQNuq1Tx0mZud/nK9l1n1Tx0mZuwJPICe1Tx0mZud/nK9l1n1Tx0mZu:BWTE/KvTfJiTE/KvT

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in System32 directory 21 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.5f0a7d1c2a396f2aa7effc6c9d438450.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.5f0a7d1c2a396f2aa7effc6c9d438450.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4472
    • C:\Windows\SysWOW64\Dekobaki.exe
      C:\Windows\system32\Dekobaki.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3540
      • C:\Windows\SysWOW64\Kigoeagd.exe
        C:\Windows\system32\Kigoeagd.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1800
        • C:\Windows\SysWOW64\Kpccgk32.exe
          C:\Windows\system32\Kpccgk32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:1496
          • C:\Windows\SysWOW64\Kkihedld.exe
            C:\Windows\system32\Kkihedld.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:3728
            • C:\Windows\SysWOW64\Hbknqeha.exe
              C:\Windows\system32\Hbknqeha.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2176
              • C:\Windows\SysWOW64\Pdmpck32.exe
                C:\Windows\system32\Pdmpck32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:4756
  • C:\Windows\SysWOW64\Qfolkcpb.exe
    C:\Windows\system32\Qfolkcpb.exe
    1⤵
    • Executes dropped EXE
    PID:4812
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4812 -s 400
      2⤵
      • Program crash
      PID:4976
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4812 -ip 4812
    1⤵
      PID:5104

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\Dekobaki.exe

            Filesize

            364KB

            MD5

            71bc5e8ebbcddc316b5429cb43e2046e

            SHA1

            3e5c967738071585ccd1aeee7914e3ceb681de60

            SHA256

            fe6ea341c2f9f867423931df373e9e656e10ab3127a5fe4123bacd1bcfb72280

            SHA512

            a0774b6b50b6c5f45ca4cfc0e18ea37839d535af9e70efb22c06abf48859f8215eb8b21b8533c6234225d0dab03cee8ebc66a792ee675c31ae20f622b7e6357a

          • C:\Windows\SysWOW64\Dekobaki.exe

            Filesize

            364KB

            MD5

            71bc5e8ebbcddc316b5429cb43e2046e

            SHA1

            3e5c967738071585ccd1aeee7914e3ceb681de60

            SHA256

            fe6ea341c2f9f867423931df373e9e656e10ab3127a5fe4123bacd1bcfb72280

            SHA512

            a0774b6b50b6c5f45ca4cfc0e18ea37839d535af9e70efb22c06abf48859f8215eb8b21b8533c6234225d0dab03cee8ebc66a792ee675c31ae20f622b7e6357a

          • C:\Windows\SysWOW64\Hbknqeha.exe

            Filesize

            364KB

            MD5

            0a854e625fca5716cf944f66cd6814e7

            SHA1

            fd336f51b1baef7352d73b6deb1897d759979e79

            SHA256

            d4d05f0120840de1a88c3ea93332641ad3b727ac4a2c3b373ecea7c5d403afdb

            SHA512

            1906594754843d732961c1b28872968495a275bfde5e50f5c127ffd25f39c9296e71fe48bf194c67b2a1e4e5cf0eddda1aba29cf04bcf830e4517081cce9a4e3

          • C:\Windows\SysWOW64\Hbknqeha.exe

            Filesize

            364KB

            MD5

            0a854e625fca5716cf944f66cd6814e7

            SHA1

            fd336f51b1baef7352d73b6deb1897d759979e79

            SHA256

            d4d05f0120840de1a88c3ea93332641ad3b727ac4a2c3b373ecea7c5d403afdb

            SHA512

            1906594754843d732961c1b28872968495a275bfde5e50f5c127ffd25f39c9296e71fe48bf194c67b2a1e4e5cf0eddda1aba29cf04bcf830e4517081cce9a4e3

          • C:\Windows\SysWOW64\Kigoeagd.exe

            Filesize

            364KB

            MD5

            2dc572492fe7d7b7d708d81fed8e0dba

            SHA1

            bb96de3804fb48e8cb62411f6cdbc2fecf5a6322

            SHA256

            b1b35e5dc640df2b75a07d910d70a2a91e3877c246cd189c761b47461a2247ef

            SHA512

            c5534487da888f1e9dea555779c14f7e8ca5f3c473e3a8b8dca1b3bae020ef91bb1ad85d874c1a159abf85fd2acb8ca65c2503a472e36938f090f8acd319b0d4

          • C:\Windows\SysWOW64\Kigoeagd.exe

            Filesize

            364KB

            MD5

            2dc572492fe7d7b7d708d81fed8e0dba

            SHA1

            bb96de3804fb48e8cb62411f6cdbc2fecf5a6322

            SHA256

            b1b35e5dc640df2b75a07d910d70a2a91e3877c246cd189c761b47461a2247ef

            SHA512

            c5534487da888f1e9dea555779c14f7e8ca5f3c473e3a8b8dca1b3bae020ef91bb1ad85d874c1a159abf85fd2acb8ca65c2503a472e36938f090f8acd319b0d4

          • C:\Windows\SysWOW64\Kkihedld.exe

            Filesize

            364KB

            MD5

            97f00447c57bba8622c9e9cee8cf3ca9

            SHA1

            9e0fb9372e63c195091edebd73ebc7214acbccd8

            SHA256

            64f00c6e2d35109284a88d4f984a590ce0763e0b93e0e34a06d55548aaf9d8ea

            SHA512

            700332032eb51c14589e4a68e093cdea87da44e161be06be8728243dce23da81f69cd1cb5ceb13c03e911335f560ec40264d22f2277196f1cf671d9f2db5ec11

          • C:\Windows\SysWOW64\Kkihedld.exe

            Filesize

            364KB

            MD5

            97f00447c57bba8622c9e9cee8cf3ca9

            SHA1

            9e0fb9372e63c195091edebd73ebc7214acbccd8

            SHA256

            64f00c6e2d35109284a88d4f984a590ce0763e0b93e0e34a06d55548aaf9d8ea

            SHA512

            700332032eb51c14589e4a68e093cdea87da44e161be06be8728243dce23da81f69cd1cb5ceb13c03e911335f560ec40264d22f2277196f1cf671d9f2db5ec11

          • C:\Windows\SysWOW64\Kpccgk32.exe

            Filesize

            364KB

            MD5

            f79a47f0977a143568da8d9057a16a2d

            SHA1

            ebfa970efb5908a58f70a3bad2ae49358a160489

            SHA256

            7dd8d2c563b7b2b45dc388705995f355e3fe5de3c9a2bffa3d8617a4b1a9d7d2

            SHA512

            7d6b9fc1c8c36e2a8d9707ff81a08648920796d5694ade2c43363838046fe18749366b96df00f3d7a4e6eeb58ee80e42b2d0813c675308c4cc43b1da302923f0

          • C:\Windows\SysWOW64\Kpccgk32.exe

            Filesize

            364KB

            MD5

            f79a47f0977a143568da8d9057a16a2d

            SHA1

            ebfa970efb5908a58f70a3bad2ae49358a160489

            SHA256

            7dd8d2c563b7b2b45dc388705995f355e3fe5de3c9a2bffa3d8617a4b1a9d7d2

            SHA512

            7d6b9fc1c8c36e2a8d9707ff81a08648920796d5694ade2c43363838046fe18749366b96df00f3d7a4e6eeb58ee80e42b2d0813c675308c4cc43b1da302923f0

          • C:\Windows\SysWOW64\Pdmpck32.exe

            Filesize

            364KB

            MD5

            69017b406b703a9557f33484b3df92cc

            SHA1

            6e0ff54bfc20f195435dae92cd44d1ee1c4841e1

            SHA256

            a9e30d0c6129e5b1709319d1b971c4613e0ce98a9c2944eb45b1bf180e45bc2b

            SHA512

            f5055501e20192ef3774408866624999fe6fb97f7f29df38d9113239155472b34a8f5def394a3ab8b6b6e2777c94c2e9cd773457ec7d2b99f7ebbb728a086154

          • C:\Windows\SysWOW64\Pdmpck32.exe

            Filesize

            364KB

            MD5

            69017b406b703a9557f33484b3df92cc

            SHA1

            6e0ff54bfc20f195435dae92cd44d1ee1c4841e1

            SHA256

            a9e30d0c6129e5b1709319d1b971c4613e0ce98a9c2944eb45b1bf180e45bc2b

            SHA512

            f5055501e20192ef3774408866624999fe6fb97f7f29df38d9113239155472b34a8f5def394a3ab8b6b6e2777c94c2e9cd773457ec7d2b99f7ebbb728a086154

          • C:\Windows\SysWOW64\Qfolkcpb.exe

            Filesize

            364KB

            MD5

            0780c28221bd16e19e8f2523422aaf00

            SHA1

            251e03b739e1f2c45394351fa88fee05c6aeac3a

            SHA256

            efc2b2cd89913ba2eb9297f52bc427520426418a49fbcbefad5ca30212021890

            SHA512

            4a79bec4ece45cf2f40f2b5edbf430b35dfa6b38227cea7b9df968c4d73b6316fd7072f431b7fa19dba7f0c9ce1c4d4d10b484227366b5da9d7f53dd14e16c40

          • C:\Windows\SysWOW64\Qfolkcpb.exe

            Filesize

            364KB

            MD5

            0780c28221bd16e19e8f2523422aaf00

            SHA1

            251e03b739e1f2c45394351fa88fee05c6aeac3a

            SHA256

            efc2b2cd89913ba2eb9297f52bc427520426418a49fbcbefad5ca30212021890

            SHA512

            4a79bec4ece45cf2f40f2b5edbf430b35dfa6b38227cea7b9df968c4d73b6316fd7072f431b7fa19dba7f0c9ce1c4d4d10b484227366b5da9d7f53dd14e16c40

          • memory/1496-25-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1496-37-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1800-17-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1800-36-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/2176-45-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/2176-67-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/3540-30-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/3540-9-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/3728-35-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/3728-64-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/4472-0-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/4472-5-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/4756-53-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/4756-68-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/4812-61-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB