Analysis
-
max time kernel
125s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
13/11/2023, 01:56
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.e18f2ef0dad4026996dcdad9bc453d80.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.e18f2ef0dad4026996dcdad9bc453d80.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.e18f2ef0dad4026996dcdad9bc453d80.exe
-
Size
192KB
-
MD5
e18f2ef0dad4026996dcdad9bc453d80
-
SHA1
742acc4cbc8699fe3d40ee5baec84358649048b0
-
SHA256
f570d306f31da017163d9a2e70340ce1856eb7e18e29dfb4c9597f8860c41de8
-
SHA512
dfaa6134ba8109bc2ece47ea776726109552868f9365f21c613e4a513e62761581c257f2ffd5a1e38b7395cc8a1b5e8a6aeaf208c26fd772a08540fa60d0e116
-
SSDEEP
1536:XvVQb4cLIkN+4Weat2RKLjWlC48Pp9JAcjVSrowND57S:XvVQLIkLWeaA8KlCph9crowNs
Malware Config
Extracted
Protocol: ftp- Host:
ftp.byethost12.com - Port:
21 - Username:
b12_8082975 - Password:
951753zx
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2052 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 2104 NEAS.e18f2ef0dad4026996dcdad9bc453d80.exe 2104 NEAS.e18f2ef0dad4026996dcdad9bc453d80.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\b5c45ccd\jusched.exe NEAS.e18f2ef0dad4026996dcdad9bc453d80.exe File created C:\Program Files (x86)\b5c45ccd\b5c45ccd NEAS.e18f2ef0dad4026996dcdad9bc453d80.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job NEAS.e18f2ef0dad4026996dcdad9bc453d80.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2052 2104 NEAS.e18f2ef0dad4026996dcdad9bc453d80.exe 28 PID 2104 wrote to memory of 2052 2104 NEAS.e18f2ef0dad4026996dcdad9bc453d80.exe 28 PID 2104 wrote to memory of 2052 2104 NEAS.e18f2ef0dad4026996dcdad9bc453d80.exe 28 PID 2104 wrote to memory of 2052 2104 NEAS.e18f2ef0dad4026996dcdad9bc453d80.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.e18f2ef0dad4026996dcdad9bc453d80.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e18f2ef0dad4026996dcdad9bc453d80.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\b5c45ccd\jusched.exe"C:\Program Files (x86)\b5c45ccd\jusched.exe"2⤵
- Executes dropped EXE
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD57bdf61d37c9adf3e1c6937107016091f
SHA156b8e0c454f9dd16d508a04b3afa7e458453ac41
SHA2564c57d86c256214baa0a5a3322ef5cdd575210455b7e964ad60382bd9d4be12e0
SHA512ff4fc1a427c84f47042375749f45ee6edea73b902ae977f14243ebceb7b9a28f41fe5dd404e3ea381754d9122202bc6b61ed0152b20a1c1be76c225dd20861d1
-
Filesize
192KB
MD5bf63f2e030dc25f4f9a250392a766427
SHA155319e3b0c25ecdf8ee7aa613a6b14d61cf9d4ef
SHA256fe95364c8ad8034b5119d1a3db5cd2851ed1c7617d351e7e8c220e21ae008d13
SHA51297f940f9cf99370799a269b56f3b36459c5cafff42b4316a394e5900279114604da2c92255542d348b9260c059605f850aea2a79892e73c7d03bb1781ee0a08c
-
Filesize
192KB
MD5bf63f2e030dc25f4f9a250392a766427
SHA155319e3b0c25ecdf8ee7aa613a6b14d61cf9d4ef
SHA256fe95364c8ad8034b5119d1a3db5cd2851ed1c7617d351e7e8c220e21ae008d13
SHA51297f940f9cf99370799a269b56f3b36459c5cafff42b4316a394e5900279114604da2c92255542d348b9260c059605f850aea2a79892e73c7d03bb1781ee0a08c
-
Filesize
192KB
MD5bf63f2e030dc25f4f9a250392a766427
SHA155319e3b0c25ecdf8ee7aa613a6b14d61cf9d4ef
SHA256fe95364c8ad8034b5119d1a3db5cd2851ed1c7617d351e7e8c220e21ae008d13
SHA51297f940f9cf99370799a269b56f3b36459c5cafff42b4316a394e5900279114604da2c92255542d348b9260c059605f850aea2a79892e73c7d03bb1781ee0a08c
-
Filesize
192KB
MD5bf63f2e030dc25f4f9a250392a766427
SHA155319e3b0c25ecdf8ee7aa613a6b14d61cf9d4ef
SHA256fe95364c8ad8034b5119d1a3db5cd2851ed1c7617d351e7e8c220e21ae008d13
SHA51297f940f9cf99370799a269b56f3b36459c5cafff42b4316a394e5900279114604da2c92255542d348b9260c059605f850aea2a79892e73c7d03bb1781ee0a08c