Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
12/11/2023, 21:07
Behavioral task
behavioral1
Sample
NEAS.7990192978d6d12758dfb064ee907dd0.exe
Resource
win7-20231023-en
General
-
Target
NEAS.7990192978d6d12758dfb064ee907dd0.exe
-
Size
468KB
-
MD5
7990192978d6d12758dfb064ee907dd0
-
SHA1
e11140a099cafa757f013194e37d2e26ee6ff136
-
SHA256
1a005f4f95d254e2b01094bbfa1175e7509289f96106789f609708847f8a11a3
-
SHA512
f7ef89f8c7f64c78044d32e390280cc1baeff448cc73d6e1792821defe46d645a8bc55e9ea7692e11a314a5ddfe776d162e6a1607d01247e65ab62d1a77f19d0
-
SSDEEP
12288:93CtSokfFGUMKwlTIU/b37dJ75WEe+eKTxB6mX:9x9GzHlTv/b35tecFB6G
Malware Config
Extracted
urelas
121.88.5.183
121.88.5.184
Signatures
-
Deletes itself 1 IoCs
pid Process 2680 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2720 sander.exe -
Loads dropped DLL 1 IoCs
pid Process 1656 NEAS.7990192978d6d12758dfb064ee907dd0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2720 1656 NEAS.7990192978d6d12758dfb064ee907dd0.exe 28 PID 1656 wrote to memory of 2720 1656 NEAS.7990192978d6d12758dfb064ee907dd0.exe 28 PID 1656 wrote to memory of 2720 1656 NEAS.7990192978d6d12758dfb064ee907dd0.exe 28 PID 1656 wrote to memory of 2720 1656 NEAS.7990192978d6d12758dfb064ee907dd0.exe 28 PID 1656 wrote to memory of 2680 1656 NEAS.7990192978d6d12758dfb064ee907dd0.exe 29 PID 1656 wrote to memory of 2680 1656 NEAS.7990192978d6d12758dfb064ee907dd0.exe 29 PID 1656 wrote to memory of 2680 1656 NEAS.7990192978d6d12758dfb064ee907dd0.exe 29 PID 1656 wrote to memory of 2680 1656 NEAS.7990192978d6d12758dfb064ee907dd0.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.7990192978d6d12758dfb064ee907dd0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.7990192978d6d12758dfb064ee907dd0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\sander.exe"C:\Users\Admin\AppData\Local\Temp\sander.exe"2⤵
- Executes dropped EXE
PID:2720
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_sannuyex.bat" "2⤵
- Deletes itself
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
287B
MD5a63a771b572610f5fc33b29181b1f923
SHA1c5545787db151289486152fdd54b73ebd528fb85
SHA256303da82cb9eec7b8ad84d8e41c9602f2935e3a2c8b85b4726f1e19d587c55ea5
SHA512c7387425ca2a62bc7c21f6524447e450ab7a6242c17132a26937fb74570c4775cfe52113fb7203cbcf58dfb557e62e870389c1769d1f899e0e5e1cf4f9d9299a
-
Filesize
287B
MD5a63a771b572610f5fc33b29181b1f923
SHA1c5545787db151289486152fdd54b73ebd528fb85
SHA256303da82cb9eec7b8ad84d8e41c9602f2935e3a2c8b85b4726f1e19d587c55ea5
SHA512c7387425ca2a62bc7c21f6524447e450ab7a6242c17132a26937fb74570c4775cfe52113fb7203cbcf58dfb557e62e870389c1769d1f899e0e5e1cf4f9d9299a
-
Filesize
512B
MD5145cec05d8d704ff7aa3d812b1aff628
SHA1097ae09965ed3804359803708b8af87b5b90fcbb
SHA25666c8ae290d7cf992faf67b10d1ef8ad91857f3709f459af69b6a11f521a3aeea
SHA5121037d7926aec2831c8b084cc19aa38ce91bc8dcff15af731ce0e7cea79fa7806d4d341a9535c39b0ccb8d6f19bc2badf6d20d3b4ab1c931cd5be6994c4323b9d
-
Filesize
468KB
MD51da47406429490641cb186df6d26a8ba
SHA168c0a6a89c2b59224370264efd7672502170921f
SHA256ac62fc6f7372c8dfe3b420557ebcf5832bb37e0007c96d00dde4b88c00f8ca63
SHA512f97d0f2ea72e1d9e8929b44f97bf3e3b0992f28af1687af57594aeab0068228657f1fb592b41dc3cae48b3755749b5060a9ac7fbf22b556a9238332a00fd6c1d
-
Filesize
468KB
MD51da47406429490641cb186df6d26a8ba
SHA168c0a6a89c2b59224370264efd7672502170921f
SHA256ac62fc6f7372c8dfe3b420557ebcf5832bb37e0007c96d00dde4b88c00f8ca63
SHA512f97d0f2ea72e1d9e8929b44f97bf3e3b0992f28af1687af57594aeab0068228657f1fb592b41dc3cae48b3755749b5060a9ac7fbf22b556a9238332a00fd6c1d