Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
16/11/2023, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe
Resource
win7-20231020-en
General
-
Target
NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe
-
Size
5.5MB
-
MD5
a61aac13f8a4841915791fb57aa2e275
-
SHA1
c34330fb238e0b9ea1cca921e42fb46966e1d577
-
SHA256
f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb
-
SHA512
9ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f
-
SSDEEP
98304:YF85vlOC7s2wQPc8V94nWFQO0R6dheB4/ncnREmThJ45aTyFXBuirxD02g9rX:COvPgZeORpR67e4/ncRZTQXBFrWd
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2852 Utsysc.exe 1688 Utsysc.exe 2060 Utsysc.exe 272 Utsysc.exe -
Loads dropped DLL 1 IoCs
pid Process 2192 NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2576 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2192 NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe 2852 Utsysc.exe 1688 Utsysc.exe 2060 Utsysc.exe 272 Utsysc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2852 2192 NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe 28 PID 2192 wrote to memory of 2852 2192 NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe 28 PID 2192 wrote to memory of 2852 2192 NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe 28 PID 2192 wrote to memory of 2852 2192 NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe 28 PID 2852 wrote to memory of 2576 2852 Utsysc.exe 29 PID 2852 wrote to memory of 2576 2852 Utsysc.exe 29 PID 2852 wrote to memory of 2576 2852 Utsysc.exe 29 PID 2852 wrote to memory of 2576 2852 Utsysc.exe 29 PID 2656 wrote to memory of 1688 2656 taskeng.exe 34 PID 2656 wrote to memory of 1688 2656 taskeng.exe 34 PID 2656 wrote to memory of 1688 2656 taskeng.exe 34 PID 2656 wrote to memory of 1688 2656 taskeng.exe 34 PID 2656 wrote to memory of 2060 2656 taskeng.exe 37 PID 2656 wrote to memory of 2060 2656 taskeng.exe 37 PID 2656 wrote to memory of 2060 2656 taskeng.exe 37 PID 2656 wrote to memory of 2060 2656 taskeng.exe 37 PID 2656 wrote to memory of 272 2656 taskeng.exe 38 PID 2656 wrote to memory of 272 2656 taskeng.exe 38 PID 2656 wrote to memory of 272 2656 taskeng.exe 38 PID 2656 wrote to memory of 272 2656 taskeng.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:2576
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {0BA1A8DD-8EB4-4DC1-9FA4-60A5B34D20E0} S-1-5-21-1154728922-3261336865-3456416385-1000:TLIDUQCQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
-
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WQGVC737\mnr[1].htm
Filesize241B
MD5b08a209e53a6820f20a4b78c8573c8b3
SHA129e84777d54d7aba38acc358db6dfb59909b5463
SHA25699b7a33709686bae04603888e909b1baa89ea8cc1336b1b010f8da47a1b0f964
SHA512bf862d9c4384a98daf8f341f1df66e09f01a28871a3de647763fd5701486580bee957f83f579b4a0e4a8065c39d9dbac248d931573b9a3efea5eb22a1219b25d
-
Filesize
5.5MB
MD5a61aac13f8a4841915791fb57aa2e275
SHA1c34330fb238e0b9ea1cca921e42fb46966e1d577
SHA256f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb
SHA5129ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f
-
Filesize
5.5MB
MD5a61aac13f8a4841915791fb57aa2e275
SHA1c34330fb238e0b9ea1cca921e42fb46966e1d577
SHA256f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb
SHA5129ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f
-
Filesize
5.5MB
MD5a61aac13f8a4841915791fb57aa2e275
SHA1c34330fb238e0b9ea1cca921e42fb46966e1d577
SHA256f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb
SHA5129ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f
-
Filesize
5.5MB
MD5a61aac13f8a4841915791fb57aa2e275
SHA1c34330fb238e0b9ea1cca921e42fb46966e1d577
SHA256f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb
SHA5129ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f
-
Filesize
5.5MB
MD5a61aac13f8a4841915791fb57aa2e275
SHA1c34330fb238e0b9ea1cca921e42fb46966e1d577
SHA256f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb
SHA5129ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f
-
Filesize
5.5MB
MD5a61aac13f8a4841915791fb57aa2e275
SHA1c34330fb238e0b9ea1cca921e42fb46966e1d577
SHA256f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb
SHA5129ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f
-
Filesize
5.5MB
MD5a61aac13f8a4841915791fb57aa2e275
SHA1c34330fb238e0b9ea1cca921e42fb46966e1d577
SHA256f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb
SHA5129ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f