Analysis

  • max time kernel
    137s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/11/2023, 09:58

General

  • Target

    NEAS.0f8b98f4ea5644f10e0d5a408918fd59.exe

  • Size

    1.3MB

  • MD5

    0f8b98f4ea5644f10e0d5a408918fd59

  • SHA1

    65ef8c4b0e2d022344702ff85ccac3667c64082d

  • SHA256

    12e997326fff5f9cbab2656938be3694654fd404f9c2e70bc14201bc25f3e694

  • SHA512

    1df86fd47fa510d5318b15ed83f44716952c945f693bce86985dc68ddfdda52f4a60a3529640ca9526de187db9f5f373fc8f77affef75eb95374a82362aaa58a

  • SSDEEP

    24576:ERyNPh2kkkkK4kXkkkkkkkkhLX3a20R0v50+YNpsKv2EvZHp3oW:IyFbazR0vKLXZ

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 18 IoCs
  • Program crash 2 IoCs
  • Modifies registry class 21 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.0f8b98f4ea5644f10e0d5a408918fd59.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.0f8b98f4ea5644f10e0d5a408918fd59.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Windows\SysWOW64\Llkjmb32.exe
      C:\Windows\system32\Llkjmb32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Windows\SysWOW64\Ncaklhdi.exe
        C:\Windows\system32\Ncaklhdi.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4572
        • C:\Windows\SysWOW64\Obkahddl.exe
          C:\Windows\system32\Obkahddl.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2404
          • C:\Windows\SysWOW64\Qihoak32.exe
            C:\Windows\system32\Qihoak32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2228
            • C:\Windows\SysWOW64\Bmddihfj.exe
              C:\Windows\system32\Bmddihfj.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3164
              • C:\Windows\SysWOW64\Dbkhnk32.exe
                C:\Windows\system32\Dbkhnk32.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:228
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 412
                  8⤵
                  • Program crash
                  PID:4364
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 412
                  8⤵
                  • Program crash
                  PID:2384
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 228 -ip 228
    1⤵
      PID:3480

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Bmddihfj.exe

      Filesize

      1.3MB

      MD5

      33dd4cd5f8399fe0026203598623ac3e

      SHA1

      03fa10f84aaa9c499c103926577fbf4882e45f49

      SHA256

      a8341499bb748456b82d716e0b3b687a1338cfe1732dd810fb74f5990220ca85

      SHA512

      0957dcbea18deeab872617e542fcbb5b0f15c3308ddb036ff09f0e9ad6e9779de30d3cd2da9f512aa6416fe4ca5326d61a6cee42c52e6734dd0852a2f603d72b

    • C:\Windows\SysWOW64\Bmddihfj.exe

      Filesize

      1.3MB

      MD5

      33dd4cd5f8399fe0026203598623ac3e

      SHA1

      03fa10f84aaa9c499c103926577fbf4882e45f49

      SHA256

      a8341499bb748456b82d716e0b3b687a1338cfe1732dd810fb74f5990220ca85

      SHA512

      0957dcbea18deeab872617e542fcbb5b0f15c3308ddb036ff09f0e9ad6e9779de30d3cd2da9f512aa6416fe4ca5326d61a6cee42c52e6734dd0852a2f603d72b

    • C:\Windows\SysWOW64\Dbkhnk32.exe

      Filesize

      1.3MB

      MD5

      3808fa97a269d4732be43d934ae6b817

      SHA1

      1d127ec15b145a548bbe32c594020973857d50e7

      SHA256

      289697a98615841f3707d55dbadbaae24edf628e79c2be30bea68f3aafe32b6c

      SHA512

      5b75808a774ccebe54764eca9cdc1375c3311cdc68fbab0348452455dbad6653b25a551f8c116afb5601e6e5ad59e94676d5030bacedae122c949135b0fb875b

    • C:\Windows\SysWOW64\Dbkhnk32.exe

      Filesize

      1.3MB

      MD5

      3808fa97a269d4732be43d934ae6b817

      SHA1

      1d127ec15b145a548bbe32c594020973857d50e7

      SHA256

      289697a98615841f3707d55dbadbaae24edf628e79c2be30bea68f3aafe32b6c

      SHA512

      5b75808a774ccebe54764eca9cdc1375c3311cdc68fbab0348452455dbad6653b25a551f8c116afb5601e6e5ad59e94676d5030bacedae122c949135b0fb875b

    • C:\Windows\SysWOW64\Llkjmb32.exe

      Filesize

      1.3MB

      MD5

      c829565d5aefb2012dfe82feabc416b7

      SHA1

      15348e3e8f1bd9f95bdcfe9fc8a1291492276b71

      SHA256

      853a304451e15b6c956f7cf485465bcb4922692931fce917eb5c52fad74c6bdb

      SHA512

      b169968c46fbb59f892049835be6b6303a5044c68dcf382b10771461d108e0ae7455122499539cc245d861cdb8ea8851b608b538e823c3a8f548fa6195ab3352

    • C:\Windows\SysWOW64\Llkjmb32.exe

      Filesize

      1.3MB

      MD5

      c829565d5aefb2012dfe82feabc416b7

      SHA1

      15348e3e8f1bd9f95bdcfe9fc8a1291492276b71

      SHA256

      853a304451e15b6c956f7cf485465bcb4922692931fce917eb5c52fad74c6bdb

      SHA512

      b169968c46fbb59f892049835be6b6303a5044c68dcf382b10771461d108e0ae7455122499539cc245d861cdb8ea8851b608b538e823c3a8f548fa6195ab3352

    • C:\Windows\SysWOW64\Mbgjlq32.dll

      Filesize

      7KB

      MD5

      be25a82f534e1338312563b2cace3647

      SHA1

      e04312ecfd181ef745303831cf6c60521e40c08d

      SHA256

      b659aad0b5ca3706b4fb0bd1ef69a98aa21579b96dcdaba428f7af918406cc66

      SHA512

      82c5da83ebe4f6efa520446e85faf9d1da6bf812367b3381a310cffe1db3c02385a0154fa8a3ab8e58cac96960de73676e3e23a84cfc2702e391efd04ace62a1

    • C:\Windows\SysWOW64\Ncaklhdi.exe

      Filesize

      1.3MB

      MD5

      5a497feef3aaadc8574b9fa034cecc50

      SHA1

      8136821e71e2d2c69b666e10ce65c93039652059

      SHA256

      9ec81b7bd49b066e9fa6e27f0ccb9183af458d8f927f513373318c88e03b6cc5

      SHA512

      262ad74e15875a3fdd182ce4c1b05a252bc8da6d28ed80025b01a94c8ac0e8107d2c37a12c5e2c0ddaad56d94ebe7c4382d5297a5426c606c792ac3be72f408f

    • C:\Windows\SysWOW64\Ncaklhdi.exe

      Filesize

      1.3MB

      MD5

      5a497feef3aaadc8574b9fa034cecc50

      SHA1

      8136821e71e2d2c69b666e10ce65c93039652059

      SHA256

      9ec81b7bd49b066e9fa6e27f0ccb9183af458d8f927f513373318c88e03b6cc5

      SHA512

      262ad74e15875a3fdd182ce4c1b05a252bc8da6d28ed80025b01a94c8ac0e8107d2c37a12c5e2c0ddaad56d94ebe7c4382d5297a5426c606c792ac3be72f408f

    • C:\Windows\SysWOW64\Obkahddl.exe

      Filesize

      1.3MB

      MD5

      a9a1412f59a797ca913dda5ca2927b63

      SHA1

      a6f484cad23fad11c2017d1cb80393ed833dafcd

      SHA256

      4a681dfa777493d52b5bed51ad4616723af37113ea9de724b80daaaea75fc0cf

      SHA512

      0a22cd6ed0ce4e6b131076922512ace88ca98b2b07824c9276877baaac71f5c7f5b21f1bbef4a770ca682cf95b1f3afb0b6625e8ab460c5a44e92cb6c4789429

    • C:\Windows\SysWOW64\Obkahddl.exe

      Filesize

      1.3MB

      MD5

      a9a1412f59a797ca913dda5ca2927b63

      SHA1

      a6f484cad23fad11c2017d1cb80393ed833dafcd

      SHA256

      4a681dfa777493d52b5bed51ad4616723af37113ea9de724b80daaaea75fc0cf

      SHA512

      0a22cd6ed0ce4e6b131076922512ace88ca98b2b07824c9276877baaac71f5c7f5b21f1bbef4a770ca682cf95b1f3afb0b6625e8ab460c5a44e92cb6c4789429

    • C:\Windows\SysWOW64\Qihoak32.exe

      Filesize

      1.3MB

      MD5

      86016ba462dcc05c5caa8e7d66d3fbdd

      SHA1

      f1e03df64fd433b2331f4fcb09514be40a4023fd

      SHA256

      a70ac1f789b2d846a802bb55270f9faad9601ad7e236388d8ccf8e566044ae42

      SHA512

      d1049c4ef9ea5f5ca8086ed8acf434c837f6a46b174c92cf42a5ab21ed94e2e99e8d41ac3767187b2cc72f712a07aced1b6de4625de80ddc18cf7e46ffa3c1ea

    • C:\Windows\SysWOW64\Qihoak32.exe

      Filesize

      1.3MB

      MD5

      e04849130b635911d3779aa8db8ffb87

      SHA1

      6f38c6fea55cadda6c92fb05adc37ee1a18da5b4

      SHA256

      06e8dd925a9e9b0f2f6045e2c7acc168bee0add0bc448fd41ae1b1e4c4db15a3

      SHA512

      00f6dced8721e8bfc6feb3ad1576a915a7fc5b46a03181cde0d1aa48b8e92872add7f3336dd6a55fc59734ea606957e00e38e53c4ad497538ef4cd1078ef2bee

    • C:\Windows\SysWOW64\Qihoak32.exe

      Filesize

      1.3MB

      MD5

      e04849130b635911d3779aa8db8ffb87

      SHA1

      6f38c6fea55cadda6c92fb05adc37ee1a18da5b4

      SHA256

      06e8dd925a9e9b0f2f6045e2c7acc168bee0add0bc448fd41ae1b1e4c4db15a3

      SHA512

      00f6dced8721e8bfc6feb3ad1576a915a7fc5b46a03181cde0d1aa48b8e92872add7f3336dd6a55fc59734ea606957e00e38e53c4ad497538ef4cd1078ef2bee

    • memory/228-49-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/228-56-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1820-0-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1820-5-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2228-32-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2228-54-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2404-24-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2404-53-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2772-51-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2772-8-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3164-41-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3164-55-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4572-17-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4572-52-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB