Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    16/11/2023, 22:38

General

  • Target

    NEAS.fe3d834833d66e011d79fbebf00a3ad0.exe

  • Size

    108KB

  • MD5

    fe3d834833d66e011d79fbebf00a3ad0

  • SHA1

    6de99a7fcd54a88edc47e46d22b3700f0182254a

  • SHA256

    afef7002dda0b9c446451cffcf3c7fcf66ebddd8f9a3b54d44675c453e00a2d2

  • SHA512

    267184ad47e8a4e3965f1d8ce4482506dc39f20988ff436d246f16c75964b86ddf10533742e535cbad1e1c5017fb9697424d41ff808ca94334917c177ace029b

  • SSDEEP

    1536:5HUzh9PWe+nBqWRucnRWG1idIvf1xjij+p4jlS2fbwU7h4HVQJeX:OieaBqWjWG1idCQF+VX

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.fe3d834833d66e011d79fbebf00a3ad0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.fe3d834833d66e011d79fbebf00a3ad0.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Users\Admin\wiione.exe
      "C:\Users\Admin\wiione.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\wiione.exe

    Filesize

    108KB

    MD5

    3268b169077e1327b94ef5bdf6d50cef

    SHA1

    829046f1f734ee90bab5b7586648dac30754a409

    SHA256

    7815fc8ff6b38b3737a1274b28ae533d347b39973c93d410a5991b614fa35d63

    SHA512

    7e3d53f5cb7265c1ea9c9c47b327b5b6994570f56eba7cc37066544facc92d3e1860ed87b888062da4f980360867ee467d981cb93eee5f2d8956ccc168675023

  • C:\Users\Admin\wiione.exe

    Filesize

    108KB

    MD5

    3268b169077e1327b94ef5bdf6d50cef

    SHA1

    829046f1f734ee90bab5b7586648dac30754a409

    SHA256

    7815fc8ff6b38b3737a1274b28ae533d347b39973c93d410a5991b614fa35d63

    SHA512

    7e3d53f5cb7265c1ea9c9c47b327b5b6994570f56eba7cc37066544facc92d3e1860ed87b888062da4f980360867ee467d981cb93eee5f2d8956ccc168675023

  • C:\Users\Admin\wiione.exe

    Filesize

    108KB

    MD5

    3268b169077e1327b94ef5bdf6d50cef

    SHA1

    829046f1f734ee90bab5b7586648dac30754a409

    SHA256

    7815fc8ff6b38b3737a1274b28ae533d347b39973c93d410a5991b614fa35d63

    SHA512

    7e3d53f5cb7265c1ea9c9c47b327b5b6994570f56eba7cc37066544facc92d3e1860ed87b888062da4f980360867ee467d981cb93eee5f2d8956ccc168675023

  • \Users\Admin\wiione.exe

    Filesize

    108KB

    MD5

    3268b169077e1327b94ef5bdf6d50cef

    SHA1

    829046f1f734ee90bab5b7586648dac30754a409

    SHA256

    7815fc8ff6b38b3737a1274b28ae533d347b39973c93d410a5991b614fa35d63

    SHA512

    7e3d53f5cb7265c1ea9c9c47b327b5b6994570f56eba7cc37066544facc92d3e1860ed87b888062da4f980360867ee467d981cb93eee5f2d8956ccc168675023

  • \Users\Admin\wiione.exe

    Filesize

    108KB

    MD5

    3268b169077e1327b94ef5bdf6d50cef

    SHA1

    829046f1f734ee90bab5b7586648dac30754a409

    SHA256

    7815fc8ff6b38b3737a1274b28ae533d347b39973c93d410a5991b614fa35d63

    SHA512

    7e3d53f5cb7265c1ea9c9c47b327b5b6994570f56eba7cc37066544facc92d3e1860ed87b888062da4f980360867ee467d981cb93eee5f2d8956ccc168675023