Analysis
-
max time kernel
172s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2023 04:48
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.8e5b64524479e35691da0d13a53fd560.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.8e5b64524479e35691da0d13a53fd560.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.8e5b64524479e35691da0d13a53fd560.exe
-
Size
932KB
-
MD5
8e5b64524479e35691da0d13a53fd560
-
SHA1
9c0ed60022f5a37d6e35e691d1800433d919864e
-
SHA256
b035b8a4f7317697d21a869caddfaced3509483db97e7203109433b55b9cb3b4
-
SHA512
754312b23721d3e01b173e44bcff2d0f5a1eb3c5d4374cb1091f759e31a94dfc4a6eea4fa5d8599be710f255316c34c60ed6d3d047bc60fe1cd689bd83ab34e9
-
SSDEEP
12288:P1/aGLDCMNpNAkoSzZWD8ayX2MQCw7D0FoWxJpcEi0/3IWV//7cSd/Xo0GGjSOpM:P1/aGLDCM4D8ayGMZo8/jXcc2ccDplH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3812 wvugu.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\wvugu.exe" wvugu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3108 wrote to memory of 3812 3108 NEAS.8e5b64524479e35691da0d13a53fd560.exe 88 PID 3108 wrote to memory of 3812 3108 NEAS.8e5b64524479e35691da0d13a53fd560.exe 88 PID 3108 wrote to memory of 3812 3108 NEAS.8e5b64524479e35691da0d13a53fd560.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.8e5b64524479e35691da0d13a53fd560.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.8e5b64524479e35691da0d13a53fd560.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\ProgramData\wvugu.exe"C:\ProgramData\wvugu.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
932KB
MD58eabb6f368d739b0c7ec6511ddd6b162
SHA1b504046ae4e3d2556b24f7133872132f32ea832f
SHA256a542f1f4a27c84f95d8cb676f1936176af46846193e6bf86a0dce548c6b4bde5
SHA512f65fe0c4bd7bdfa72e52b45c49176ee9e39208d412208e97d9527d4ecb067d4aaddb44139c679f2b42174bcb98195046c2b632c03aeb24adcc89b2ea11fb7bd5
-
Filesize
477KB
MD570d6cb7dd01ebd5a21af02945d2ae12f
SHA105260b3e17a221e66b58d1e5ed1d0f518392159a
SHA256136fb79a4b868976a011043345fbef2cb088dd799757ec3970480eb99d9f2e92
SHA512b2c4c5b6bc5519ebb8e701c37eb298f6bdbb89b09bbf93a4f5c7a0e5b809b7bb3a6355087797e5064c1cc67a1555cbdab782fcba2f8a9d0f18d4f53337a34ea9
-
Filesize
477KB
MD570d6cb7dd01ebd5a21af02945d2ae12f
SHA105260b3e17a221e66b58d1e5ed1d0f518392159a
SHA256136fb79a4b868976a011043345fbef2cb088dd799757ec3970480eb99d9f2e92
SHA512b2c4c5b6bc5519ebb8e701c37eb298f6bdbb89b09bbf93a4f5c7a0e5b809b7bb3a6355087797e5064c1cc67a1555cbdab782fcba2f8a9d0f18d4f53337a34ea9
-
Filesize
454KB
MD5863e2ddc888c317831fbd8243ce957b7
SHA15e6601223c357d1986b79ef40f52eed8919eaf34
SHA2561aad8507dca44ba3473562c2dd386b1dfee4999bd377edb090b3568569fc50a1
SHA512a5512b807133150fb1250dda8988bf3d2ceb0425a85a66f101ad7b55c93f849104b04789e5531f8f0652ffa43e8118ca42dd08d08321feb90b1fef49eea2cec0
-
Filesize
454KB
MD5863e2ddc888c317831fbd8243ce957b7
SHA15e6601223c357d1986b79ef40f52eed8919eaf34
SHA2561aad8507dca44ba3473562c2dd386b1dfee4999bd377edb090b3568569fc50a1
SHA512a5512b807133150fb1250dda8988bf3d2ceb0425a85a66f101ad7b55c93f849104b04789e5531f8f0652ffa43e8118ca42dd08d08321feb90b1fef49eea2cec0