Analysis

  • max time kernel
    146s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    16/11/2023, 17:25

General

  • Target

    NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe

  • Size

    5.5MB

  • MD5

    a61aac13f8a4841915791fb57aa2e275

  • SHA1

    c34330fb238e0b9ea1cca921e42fb46966e1d577

  • SHA256

    f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb

  • SHA512

    9ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f

  • SSDEEP

    98304:YF85vlOC7s2wQPc8V94nWFQO0R6dheB4/ncnREmThJ45aTyFXBuirxD02g9rX:COvPgZeORpR67e4/ncRZTQXBFrWd

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe
      "C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:2576
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {0BA1A8DD-8EB4-4DC1-9FA4-60A5B34D20E0} S-1-5-21-1154728922-3261336865-3456416385-1000:TLIDUQCQ\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe
      C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1688
    • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe
      C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2060
    • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe
      C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WQGVC737\mnr[1].htm

    Filesize

    241B

    MD5

    b08a209e53a6820f20a4b78c8573c8b3

    SHA1

    29e84777d54d7aba38acc358db6dfb59909b5463

    SHA256

    99b7a33709686bae04603888e909b1baa89ea8cc1336b1b010f8da47a1b0f964

    SHA512

    bf862d9c4384a98daf8f341f1df66e09f01a28871a3de647763fd5701486580bee957f83f579b4a0e4a8065c39d9dbac248d931573b9a3efea5eb22a1219b25d

  • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe

    Filesize

    5.5MB

    MD5

    a61aac13f8a4841915791fb57aa2e275

    SHA1

    c34330fb238e0b9ea1cca921e42fb46966e1d577

    SHA256

    f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb

    SHA512

    9ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f

  • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe

    Filesize

    5.5MB

    MD5

    a61aac13f8a4841915791fb57aa2e275

    SHA1

    c34330fb238e0b9ea1cca921e42fb46966e1d577

    SHA256

    f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb

    SHA512

    9ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f

  • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe

    Filesize

    5.5MB

    MD5

    a61aac13f8a4841915791fb57aa2e275

    SHA1

    c34330fb238e0b9ea1cca921e42fb46966e1d577

    SHA256

    f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb

    SHA512

    9ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f

  • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe

    Filesize

    5.5MB

    MD5

    a61aac13f8a4841915791fb57aa2e275

    SHA1

    c34330fb238e0b9ea1cca921e42fb46966e1d577

    SHA256

    f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb

    SHA512

    9ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f

  • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe

    Filesize

    5.5MB

    MD5

    a61aac13f8a4841915791fb57aa2e275

    SHA1

    c34330fb238e0b9ea1cca921e42fb46966e1d577

    SHA256

    f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb

    SHA512

    9ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f

  • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe

    Filesize

    5.5MB

    MD5

    a61aac13f8a4841915791fb57aa2e275

    SHA1

    c34330fb238e0b9ea1cca921e42fb46966e1d577

    SHA256

    f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb

    SHA512

    9ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f

  • \Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe

    Filesize

    5.5MB

    MD5

    a61aac13f8a4841915791fb57aa2e275

    SHA1

    c34330fb238e0b9ea1cca921e42fb46966e1d577

    SHA256

    f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb

    SHA512

    9ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f

  • memory/272-227-0x0000000000A10000-0x000000000141C000-memory.dmp

    Filesize

    10.0MB

  • memory/272-191-0x0000000000A10000-0x000000000141C000-memory.dmp

    Filesize

    10.0MB

  • memory/272-188-0x0000000000A10000-0x000000000141C000-memory.dmp

    Filesize

    10.0MB

  • memory/1688-103-0x00000000000F0000-0x00000000000F1000-memory.dmp

    Filesize

    4KB

  • memory/1688-105-0x0000000077C90000-0x0000000077C91000-memory.dmp

    Filesize

    4KB

  • memory/1688-101-0x0000000000A10000-0x000000000141C000-memory.dmp

    Filesize

    10.0MB

  • memory/1688-98-0x0000000000A10000-0x000000000141C000-memory.dmp

    Filesize

    10.0MB

  • memory/1688-138-0x0000000000A10000-0x000000000141C000-memory.dmp

    Filesize

    10.0MB

  • memory/2060-145-0x0000000000A10000-0x000000000141C000-memory.dmp

    Filesize

    10.0MB

  • memory/2060-148-0x0000000000A10000-0x000000000141C000-memory.dmp

    Filesize

    10.0MB

  • memory/2060-183-0x0000000000A10000-0x000000000141C000-memory.dmp

    Filesize

    10.0MB

  • memory/2192-23-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/2192-7-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/2192-38-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2192-36-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2192-33-0x0000000000210000-0x0000000000211000-memory.dmp

    Filesize

    4KB

  • memory/2192-51-0x0000000000CD0000-0x00000000016DC000-memory.dmp

    Filesize

    10.0MB

  • memory/2192-31-0x0000000000210000-0x0000000000211000-memory.dmp

    Filesize

    4KB

  • memory/2192-2-0x0000000000CD0000-0x00000000016DC000-memory.dmp

    Filesize

    10.0MB

  • memory/2192-3-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/2192-42-0x0000000000430000-0x0000000000431000-memory.dmp

    Filesize

    4KB

  • memory/2192-5-0x0000000000CD0000-0x00000000016DC000-memory.dmp

    Filesize

    10.0MB

  • memory/2192-0-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/2192-9-0x0000000077C90000-0x0000000077C91000-memory.dmp

    Filesize

    4KB

  • memory/2192-8-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2192-16-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/2192-14-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/2192-13-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2192-11-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2192-18-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/2192-21-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/2192-28-0x0000000000200000-0x0000000000201000-memory.dmp

    Filesize

    4KB

  • memory/2192-26-0x0000000000200000-0x0000000000201000-memory.dmp

    Filesize

    4KB

  • memory/2852-59-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2852-80-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB

  • memory/2852-78-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB

  • memory/2852-75-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/2852-139-0x0000000000A10000-0x000000000141C000-memory.dmp

    Filesize

    10.0MB

  • memory/2852-73-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/2852-70-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/2852-63-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2852-65-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2852-68-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/2852-61-0x0000000077C90000-0x0000000077C91000-memory.dmp

    Filesize

    4KB

  • memory/2852-58-0x0000000000A10000-0x000000000141C000-memory.dmp

    Filesize

    10.0MB

  • memory/2852-56-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2852-55-0x0000000000A10000-0x000000000141C000-memory.dmp

    Filesize

    10.0MB