Analysis

  • max time kernel
    125s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    13/11/2023, 01:56

General

  • Target

    NEAS.e18f2ef0dad4026996dcdad9bc453d80.exe

  • Size

    192KB

  • MD5

    e18f2ef0dad4026996dcdad9bc453d80

  • SHA1

    742acc4cbc8699fe3d40ee5baec84358649048b0

  • SHA256

    f570d306f31da017163d9a2e70340ce1856eb7e18e29dfb4c9597f8860c41de8

  • SHA512

    dfaa6134ba8109bc2ece47ea776726109552868f9365f21c613e4a513e62761581c257f2ffd5a1e38b7395cc8a1b5e8a6aeaf208c26fd772a08540fa60d0e116

  • SSDEEP

    1536:XvVQb4cLIkN+4Weat2RKLjWlC48Pp9JAcjVSrowND57S:XvVQLIkLWeaA8KlCph9crowNs

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.byethost12.com
  • Port:
    21
  • Username:
    b12_8082975
  • Password:
    951753zx

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.e18f2ef0dad4026996dcdad9bc453d80.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.e18f2ef0dad4026996dcdad9bc453d80.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Program Files (x86)\b5c45ccd\jusched.exe
      "C:\Program Files (x86)\b5c45ccd\jusched.exe"
      2⤵
      • Executes dropped EXE
      PID:2052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\b5c45ccd\b5c45ccd

    Filesize

    17B

    MD5

    7bdf61d37c9adf3e1c6937107016091f

    SHA1

    56b8e0c454f9dd16d508a04b3afa7e458453ac41

    SHA256

    4c57d86c256214baa0a5a3322ef5cdd575210455b7e964ad60382bd9d4be12e0

    SHA512

    ff4fc1a427c84f47042375749f45ee6edea73b902ae977f14243ebceb7b9a28f41fe5dd404e3ea381754d9122202bc6b61ed0152b20a1c1be76c225dd20861d1

  • C:\Program Files (x86)\b5c45ccd\jusched.exe

    Filesize

    192KB

    MD5

    bf63f2e030dc25f4f9a250392a766427

    SHA1

    55319e3b0c25ecdf8ee7aa613a6b14d61cf9d4ef

    SHA256

    fe95364c8ad8034b5119d1a3db5cd2851ed1c7617d351e7e8c220e21ae008d13

    SHA512

    97f940f9cf99370799a269b56f3b36459c5cafff42b4316a394e5900279114604da2c92255542d348b9260c059605f850aea2a79892e73c7d03bb1781ee0a08c

  • C:\Program Files (x86)\b5c45ccd\jusched.exe

    Filesize

    192KB

    MD5

    bf63f2e030dc25f4f9a250392a766427

    SHA1

    55319e3b0c25ecdf8ee7aa613a6b14d61cf9d4ef

    SHA256

    fe95364c8ad8034b5119d1a3db5cd2851ed1c7617d351e7e8c220e21ae008d13

    SHA512

    97f940f9cf99370799a269b56f3b36459c5cafff42b4316a394e5900279114604da2c92255542d348b9260c059605f850aea2a79892e73c7d03bb1781ee0a08c

  • \Program Files (x86)\b5c45ccd\jusched.exe

    Filesize

    192KB

    MD5

    bf63f2e030dc25f4f9a250392a766427

    SHA1

    55319e3b0c25ecdf8ee7aa613a6b14d61cf9d4ef

    SHA256

    fe95364c8ad8034b5119d1a3db5cd2851ed1c7617d351e7e8c220e21ae008d13

    SHA512

    97f940f9cf99370799a269b56f3b36459c5cafff42b4316a394e5900279114604da2c92255542d348b9260c059605f850aea2a79892e73c7d03bb1781ee0a08c

  • \Program Files (x86)\b5c45ccd\jusched.exe

    Filesize

    192KB

    MD5

    bf63f2e030dc25f4f9a250392a766427

    SHA1

    55319e3b0c25ecdf8ee7aa613a6b14d61cf9d4ef

    SHA256

    fe95364c8ad8034b5119d1a3db5cd2851ed1c7617d351e7e8c220e21ae008d13

    SHA512

    97f940f9cf99370799a269b56f3b36459c5cafff42b4316a394e5900279114604da2c92255542d348b9260c059605f850aea2a79892e73c7d03bb1781ee0a08c

  • memory/2052-14-0x0000000000400000-0x00000000004CA000-memory.dmp

    Filesize

    808KB

  • memory/2104-0-0x0000000000400000-0x00000000004CA000-memory.dmp

    Filesize

    808KB

  • memory/2104-13-0x0000000000400000-0x00000000004CA000-memory.dmp

    Filesize

    808KB

  • memory/2104-11-0x00000000026C0000-0x000000000278A000-memory.dmp

    Filesize

    808KB