Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    11/11/2023, 17:23

General

  • Target

    NEAS.f6efbce12010655652c93444af948ad0.exe

  • Size

    80KB

  • MD5

    f6efbce12010655652c93444af948ad0

  • SHA1

    37cd79a6fc4dd4313280a1252dc6660ad6f3025f

  • SHA256

    2f134d7e3e53e2e22ba60658131fc402b1be67d8a15342c3b851a60d8a099ae9

  • SHA512

    6f7e6e68cca27a6c68df8bb110677aaaed008dca6b2134ef8508bb4e57751a692bdd3834aa77d3d7ef625617f50379b9b205f61579899e96d9065ee6835c15e4

  • SSDEEP

    1536:kVp49cf34NuT2AqGK2LFziS5DUHRbPa9b6i+sIk:Up4Of3IuTtqGXFmS5DSCopsIk

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 12 IoCs
  • Drops file in System32 directory 18 IoCs
  • Modifies registry class 21 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.f6efbce12010655652c93444af948ad0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.f6efbce12010655652c93444af948ad0.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Windows\SysWOW64\Nhaikn32.exe
      C:\Windows\system32\Nhaikn32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2452
      • C:\Windows\SysWOW64\Ndhipoob.exe
        C:\Windows\system32\Ndhipoob.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1948
        • C:\Windows\SysWOW64\Niebhf32.exe
          C:\Windows\system32\Niebhf32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Windows\SysWOW64\Nlekia32.exe
            C:\Windows\system32\Nlekia32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2500
            • C:\Windows\SysWOW64\Ngkogj32.exe
              C:\Windows\system32\Ngkogj32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2792
              • C:\Windows\SysWOW64\Nlhgoqhh.exe
                C:\Windows\system32\Nlhgoqhh.exe
                7⤵
                • Executes dropped EXE
                PID:2496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Ndhipoob.exe

    Filesize

    80KB

    MD5

    49cf85d919d01da686900351e9931f8f

    SHA1

    77789fa62d188c810e62ec3b46f3d021a7c79d83

    SHA256

    1236e914b39c6b7d6b4e9a01e4945ec8a162e3615a1d539618fa84952eb75e47

    SHA512

    61f76cbf04f7ed852687af6b9a7ffbb9d3a83e8269d6317a9a46dee0d5adcb1a6ae8203cf07f7c1dac00efe9f2f8e3df179a4cb2626b3aab652198fbbc83ed15

  • C:\Windows\SysWOW64\Ndhipoob.exe

    Filesize

    80KB

    MD5

    49cf85d919d01da686900351e9931f8f

    SHA1

    77789fa62d188c810e62ec3b46f3d021a7c79d83

    SHA256

    1236e914b39c6b7d6b4e9a01e4945ec8a162e3615a1d539618fa84952eb75e47

    SHA512

    61f76cbf04f7ed852687af6b9a7ffbb9d3a83e8269d6317a9a46dee0d5adcb1a6ae8203cf07f7c1dac00efe9f2f8e3df179a4cb2626b3aab652198fbbc83ed15

  • C:\Windows\SysWOW64\Ndhipoob.exe

    Filesize

    80KB

    MD5

    49cf85d919d01da686900351e9931f8f

    SHA1

    77789fa62d188c810e62ec3b46f3d021a7c79d83

    SHA256

    1236e914b39c6b7d6b4e9a01e4945ec8a162e3615a1d539618fa84952eb75e47

    SHA512

    61f76cbf04f7ed852687af6b9a7ffbb9d3a83e8269d6317a9a46dee0d5adcb1a6ae8203cf07f7c1dac00efe9f2f8e3df179a4cb2626b3aab652198fbbc83ed15

  • C:\Windows\SysWOW64\Ngkogj32.exe

    Filesize

    80KB

    MD5

    83b19c013fae6d182d1efb205747e8a1

    SHA1

    5568ae759c71c1c2b6cc0198d4c6832713a8c3da

    SHA256

    b6b64a83e59fe1b6b4bed3ac3310822a0e77abbd09c8015390b92c372c0a82e7

    SHA512

    38c84b8c081ec7af4219009bb0fa8312d593d4a0e5cf9b1c74d11df982927e1f3ca69989e1365c04fb0c9ab7ff7089d21812bc80937cc79c597e4d6f5183495d

  • C:\Windows\SysWOW64\Ngkogj32.exe

    Filesize

    80KB

    MD5

    83b19c013fae6d182d1efb205747e8a1

    SHA1

    5568ae759c71c1c2b6cc0198d4c6832713a8c3da

    SHA256

    b6b64a83e59fe1b6b4bed3ac3310822a0e77abbd09c8015390b92c372c0a82e7

    SHA512

    38c84b8c081ec7af4219009bb0fa8312d593d4a0e5cf9b1c74d11df982927e1f3ca69989e1365c04fb0c9ab7ff7089d21812bc80937cc79c597e4d6f5183495d

  • C:\Windows\SysWOW64\Ngkogj32.exe

    Filesize

    80KB

    MD5

    83b19c013fae6d182d1efb205747e8a1

    SHA1

    5568ae759c71c1c2b6cc0198d4c6832713a8c3da

    SHA256

    b6b64a83e59fe1b6b4bed3ac3310822a0e77abbd09c8015390b92c372c0a82e7

    SHA512

    38c84b8c081ec7af4219009bb0fa8312d593d4a0e5cf9b1c74d11df982927e1f3ca69989e1365c04fb0c9ab7ff7089d21812bc80937cc79c597e4d6f5183495d

  • C:\Windows\SysWOW64\Nhaikn32.exe

    Filesize

    80KB

    MD5

    930773979a447da82acd492f8a08fa52

    SHA1

    4091dd9adc910bcae8966a98439b6bbd97586683

    SHA256

    1056c2e3c4d84fe914e482aafeae5f797e74dc6a434cfa84480356d3300fb02d

    SHA512

    f645c255155b5f2e9cc92f9751ba27d82a8504abad8edd4b186053e4a3ffe86987b5483bde8cbe91a96d6db37f75af1f076102c35a92754ab76047797251c821

  • C:\Windows\SysWOW64\Nhaikn32.exe

    Filesize

    80KB

    MD5

    930773979a447da82acd492f8a08fa52

    SHA1

    4091dd9adc910bcae8966a98439b6bbd97586683

    SHA256

    1056c2e3c4d84fe914e482aafeae5f797e74dc6a434cfa84480356d3300fb02d

    SHA512

    f645c255155b5f2e9cc92f9751ba27d82a8504abad8edd4b186053e4a3ffe86987b5483bde8cbe91a96d6db37f75af1f076102c35a92754ab76047797251c821

  • C:\Windows\SysWOW64\Nhaikn32.exe

    Filesize

    80KB

    MD5

    930773979a447da82acd492f8a08fa52

    SHA1

    4091dd9adc910bcae8966a98439b6bbd97586683

    SHA256

    1056c2e3c4d84fe914e482aafeae5f797e74dc6a434cfa84480356d3300fb02d

    SHA512

    f645c255155b5f2e9cc92f9751ba27d82a8504abad8edd4b186053e4a3ffe86987b5483bde8cbe91a96d6db37f75af1f076102c35a92754ab76047797251c821

  • C:\Windows\SysWOW64\Niebhf32.exe

    Filesize

    80KB

    MD5

    4addad81302e38a337e5b1ca03d89f70

    SHA1

    5c35cdc1792690ab5bc146d1d349f37fc2367670

    SHA256

    2019dd9bab0fcf56ff934a5d9d9964cacd1b080849c9761ed5a0a99f5b0bc5c5

    SHA512

    514a35d0cf353229fe7cb45605badd18a420e775031c9ca0cfec6e0325a50f0e3a310f6011ec7e88ad235b95d257d76d780522c374a814a40299202338f2cc6d

  • C:\Windows\SysWOW64\Niebhf32.exe

    Filesize

    80KB

    MD5

    4addad81302e38a337e5b1ca03d89f70

    SHA1

    5c35cdc1792690ab5bc146d1d349f37fc2367670

    SHA256

    2019dd9bab0fcf56ff934a5d9d9964cacd1b080849c9761ed5a0a99f5b0bc5c5

    SHA512

    514a35d0cf353229fe7cb45605badd18a420e775031c9ca0cfec6e0325a50f0e3a310f6011ec7e88ad235b95d257d76d780522c374a814a40299202338f2cc6d

  • C:\Windows\SysWOW64\Niebhf32.exe

    Filesize

    80KB

    MD5

    4addad81302e38a337e5b1ca03d89f70

    SHA1

    5c35cdc1792690ab5bc146d1d349f37fc2367670

    SHA256

    2019dd9bab0fcf56ff934a5d9d9964cacd1b080849c9761ed5a0a99f5b0bc5c5

    SHA512

    514a35d0cf353229fe7cb45605badd18a420e775031c9ca0cfec6e0325a50f0e3a310f6011ec7e88ad235b95d257d76d780522c374a814a40299202338f2cc6d

  • C:\Windows\SysWOW64\Nlekia32.exe

    Filesize

    80KB

    MD5

    30c736774f22c8cd5e43988c59593c0a

    SHA1

    70f48a7597614f5e7124a7a0ea488aa0f713813d

    SHA256

    fecb42d93559193f578aa6124dc8b1abf073468f0457183b69bf640d80210b3e

    SHA512

    ed449b691d30d4cea22056876ba776f8179eb930fb3aabeef3fe9d71858326e943f3516e0a85e1345e96cf538e40f49eaa7de4863d829c279d60ed1d25951d19

  • C:\Windows\SysWOW64\Nlekia32.exe

    Filesize

    80KB

    MD5

    30c736774f22c8cd5e43988c59593c0a

    SHA1

    70f48a7597614f5e7124a7a0ea488aa0f713813d

    SHA256

    fecb42d93559193f578aa6124dc8b1abf073468f0457183b69bf640d80210b3e

    SHA512

    ed449b691d30d4cea22056876ba776f8179eb930fb3aabeef3fe9d71858326e943f3516e0a85e1345e96cf538e40f49eaa7de4863d829c279d60ed1d25951d19

  • C:\Windows\SysWOW64\Nlekia32.exe

    Filesize

    80KB

    MD5

    30c736774f22c8cd5e43988c59593c0a

    SHA1

    70f48a7597614f5e7124a7a0ea488aa0f713813d

    SHA256

    fecb42d93559193f578aa6124dc8b1abf073468f0457183b69bf640d80210b3e

    SHA512

    ed449b691d30d4cea22056876ba776f8179eb930fb3aabeef3fe9d71858326e943f3516e0a85e1345e96cf538e40f49eaa7de4863d829c279d60ed1d25951d19

  • C:\Windows\SysWOW64\Nlhgoqhh.exe

    Filesize

    80KB

    MD5

    ee491ac8df70aa59d6a4639e29634c6d

    SHA1

    ac0f45be81c6860565c12bfab28a5b1386a51b65

    SHA256

    0daad6c892ae227e73287009fcb4e75425247439d6fa7ba3e75c217bebd93960

    SHA512

    fb9fe2befcac22cc6a31602b60e011aedfc366420491bb573ac1145d07f404274c08e10fc23bb6d7572c13f87a6007ad824ca26a57fc679193418a0097d3f9b5

  • C:\Windows\SysWOW64\Nlhgoqhh.exe

    Filesize

    80KB

    MD5

    ee491ac8df70aa59d6a4639e29634c6d

    SHA1

    ac0f45be81c6860565c12bfab28a5b1386a51b65

    SHA256

    0daad6c892ae227e73287009fcb4e75425247439d6fa7ba3e75c217bebd93960

    SHA512

    fb9fe2befcac22cc6a31602b60e011aedfc366420491bb573ac1145d07f404274c08e10fc23bb6d7572c13f87a6007ad824ca26a57fc679193418a0097d3f9b5

  • \Windows\SysWOW64\Ndhipoob.exe

    Filesize

    80KB

    MD5

    49cf85d919d01da686900351e9931f8f

    SHA1

    77789fa62d188c810e62ec3b46f3d021a7c79d83

    SHA256

    1236e914b39c6b7d6b4e9a01e4945ec8a162e3615a1d539618fa84952eb75e47

    SHA512

    61f76cbf04f7ed852687af6b9a7ffbb9d3a83e8269d6317a9a46dee0d5adcb1a6ae8203cf07f7c1dac00efe9f2f8e3df179a4cb2626b3aab652198fbbc83ed15

  • \Windows\SysWOW64\Ndhipoob.exe

    Filesize

    80KB

    MD5

    49cf85d919d01da686900351e9931f8f

    SHA1

    77789fa62d188c810e62ec3b46f3d021a7c79d83

    SHA256

    1236e914b39c6b7d6b4e9a01e4945ec8a162e3615a1d539618fa84952eb75e47

    SHA512

    61f76cbf04f7ed852687af6b9a7ffbb9d3a83e8269d6317a9a46dee0d5adcb1a6ae8203cf07f7c1dac00efe9f2f8e3df179a4cb2626b3aab652198fbbc83ed15

  • \Windows\SysWOW64\Ngkogj32.exe

    Filesize

    80KB

    MD5

    83b19c013fae6d182d1efb205747e8a1

    SHA1

    5568ae759c71c1c2b6cc0198d4c6832713a8c3da

    SHA256

    b6b64a83e59fe1b6b4bed3ac3310822a0e77abbd09c8015390b92c372c0a82e7

    SHA512

    38c84b8c081ec7af4219009bb0fa8312d593d4a0e5cf9b1c74d11df982927e1f3ca69989e1365c04fb0c9ab7ff7089d21812bc80937cc79c597e4d6f5183495d

  • \Windows\SysWOW64\Ngkogj32.exe

    Filesize

    80KB

    MD5

    83b19c013fae6d182d1efb205747e8a1

    SHA1

    5568ae759c71c1c2b6cc0198d4c6832713a8c3da

    SHA256

    b6b64a83e59fe1b6b4bed3ac3310822a0e77abbd09c8015390b92c372c0a82e7

    SHA512

    38c84b8c081ec7af4219009bb0fa8312d593d4a0e5cf9b1c74d11df982927e1f3ca69989e1365c04fb0c9ab7ff7089d21812bc80937cc79c597e4d6f5183495d

  • \Windows\SysWOW64\Nhaikn32.exe

    Filesize

    80KB

    MD5

    930773979a447da82acd492f8a08fa52

    SHA1

    4091dd9adc910bcae8966a98439b6bbd97586683

    SHA256

    1056c2e3c4d84fe914e482aafeae5f797e74dc6a434cfa84480356d3300fb02d

    SHA512

    f645c255155b5f2e9cc92f9751ba27d82a8504abad8edd4b186053e4a3ffe86987b5483bde8cbe91a96d6db37f75af1f076102c35a92754ab76047797251c821

  • \Windows\SysWOW64\Nhaikn32.exe

    Filesize

    80KB

    MD5

    930773979a447da82acd492f8a08fa52

    SHA1

    4091dd9adc910bcae8966a98439b6bbd97586683

    SHA256

    1056c2e3c4d84fe914e482aafeae5f797e74dc6a434cfa84480356d3300fb02d

    SHA512

    f645c255155b5f2e9cc92f9751ba27d82a8504abad8edd4b186053e4a3ffe86987b5483bde8cbe91a96d6db37f75af1f076102c35a92754ab76047797251c821

  • \Windows\SysWOW64\Niebhf32.exe

    Filesize

    80KB

    MD5

    4addad81302e38a337e5b1ca03d89f70

    SHA1

    5c35cdc1792690ab5bc146d1d349f37fc2367670

    SHA256

    2019dd9bab0fcf56ff934a5d9d9964cacd1b080849c9761ed5a0a99f5b0bc5c5

    SHA512

    514a35d0cf353229fe7cb45605badd18a420e775031c9ca0cfec6e0325a50f0e3a310f6011ec7e88ad235b95d257d76d780522c374a814a40299202338f2cc6d

  • \Windows\SysWOW64\Niebhf32.exe

    Filesize

    80KB

    MD5

    4addad81302e38a337e5b1ca03d89f70

    SHA1

    5c35cdc1792690ab5bc146d1d349f37fc2367670

    SHA256

    2019dd9bab0fcf56ff934a5d9d9964cacd1b080849c9761ed5a0a99f5b0bc5c5

    SHA512

    514a35d0cf353229fe7cb45605badd18a420e775031c9ca0cfec6e0325a50f0e3a310f6011ec7e88ad235b95d257d76d780522c374a814a40299202338f2cc6d

  • \Windows\SysWOW64\Nlekia32.exe

    Filesize

    80KB

    MD5

    30c736774f22c8cd5e43988c59593c0a

    SHA1

    70f48a7597614f5e7124a7a0ea488aa0f713813d

    SHA256

    fecb42d93559193f578aa6124dc8b1abf073468f0457183b69bf640d80210b3e

    SHA512

    ed449b691d30d4cea22056876ba776f8179eb930fb3aabeef3fe9d71858326e943f3516e0a85e1345e96cf538e40f49eaa7de4863d829c279d60ed1d25951d19

  • \Windows\SysWOW64\Nlekia32.exe

    Filesize

    80KB

    MD5

    30c736774f22c8cd5e43988c59593c0a

    SHA1

    70f48a7597614f5e7124a7a0ea488aa0f713813d

    SHA256

    fecb42d93559193f578aa6124dc8b1abf073468f0457183b69bf640d80210b3e

    SHA512

    ed449b691d30d4cea22056876ba776f8179eb930fb3aabeef3fe9d71858326e943f3516e0a85e1345e96cf538e40f49eaa7de4863d829c279d60ed1d25951d19

  • \Windows\SysWOW64\Nlhgoqhh.exe

    Filesize

    80KB

    MD5

    ee491ac8df70aa59d6a4639e29634c6d

    SHA1

    ac0f45be81c6860565c12bfab28a5b1386a51b65

    SHA256

    0daad6c892ae227e73287009fcb4e75425247439d6fa7ba3e75c217bebd93960

    SHA512

    fb9fe2befcac22cc6a31602b60e011aedfc366420491bb573ac1145d07f404274c08e10fc23bb6d7572c13f87a6007ad824ca26a57fc679193418a0097d3f9b5

  • \Windows\SysWOW64\Nlhgoqhh.exe

    Filesize

    80KB

    MD5

    ee491ac8df70aa59d6a4639e29634c6d

    SHA1

    ac0f45be81c6860565c12bfab28a5b1386a51b65

    SHA256

    0daad6c892ae227e73287009fcb4e75425247439d6fa7ba3e75c217bebd93960

    SHA512

    fb9fe2befcac22cc6a31602b60e011aedfc366420491bb573ac1145d07f404274c08e10fc23bb6d7572c13f87a6007ad824ca26a57fc679193418a0097d3f9b5

  • memory/1948-52-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2452-50-0x0000000000220000-0x000000000025E000-memory.dmp

    Filesize

    248KB

  • memory/2452-37-0x0000000000220000-0x000000000025E000-memory.dmp

    Filesize

    248KB

  • memory/2452-25-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2496-78-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2500-79-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2728-80-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2792-81-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2792-65-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2908-11-0x00000000001B0000-0x00000000001EE000-memory.dmp

    Filesize

    248KB

  • memory/2908-0-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2908-82-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB