Analysis
-
max time kernel
197s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
18-11-2023 02:10
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.ad069754195f22e673cbaa8aed8232d0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.ad069754195f22e673cbaa8aed8232d0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.ad069754195f22e673cbaa8aed8232d0.exe
-
Size
736KB
-
MD5
ad069754195f22e673cbaa8aed8232d0
-
SHA1
5361d9ff2e121cf44bdb9ee9fa09e2832f9ed836
-
SHA256
c1506406d60266d34a46509b65ecb6a364096d96ae80758aec3c63a67cd6860b
-
SHA512
fbada771b32f2c53d5e6fe3aa05fa9ee9507d803d5d62eea864205b3bb52a9268c3a76a23a6369594020696acb364f926fc799a60664e49a22a2bc8ac9028f1b
-
SSDEEP
12288:P1/aGLDCMNpNAkoSzZWD8ayX2MQCw7D0FoWxJpcEi0/3IWV//7cSdmW3wyWv:P1/aGLDCM4D8ayGMZo8/yW3s
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2704 yaaucd.exe -
Loads dropped DLL 2 IoCs
pid Process 2952 NEAS.ad069754195f22e673cbaa8aed8232d0.exe 2952 NEAS.ad069754195f22e673cbaa8aed8232d0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\yaaucd.exe" yaaucd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2704 2952 NEAS.ad069754195f22e673cbaa8aed8232d0.exe 29 PID 2952 wrote to memory of 2704 2952 NEAS.ad069754195f22e673cbaa8aed8232d0.exe 29 PID 2952 wrote to memory of 2704 2952 NEAS.ad069754195f22e673cbaa8aed8232d0.exe 29 PID 2952 wrote to memory of 2704 2952 NEAS.ad069754195f22e673cbaa8aed8232d0.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.ad069754195f22e673cbaa8aed8232d0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.ad069754195f22e673cbaa8aed8232d0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\ProgramData\yaaucd.exe"C:\ProgramData\yaaucd.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
736KB
MD5acdec6d735476dba673b6cf639229337
SHA17ef56cb9bb256c2dd3a9ced7eadbfce01e245d1a
SHA2566a53d8e88914ffb05f258bc4fa029c92c7ddce334281d0b37281cd0db69449f4
SHA5129ad589be7abc5e7493271d8709f675981495c8fc6a1fc3b51038b0557b7bc374486236a47b16b585db227d29cfa10ef5b9ee161a62ce88f477739b70bf3a0294
-
Filesize
477KB
MD570d6cb7dd01ebd5a21af02945d2ae12f
SHA105260b3e17a221e66b58d1e5ed1d0f518392159a
SHA256136fb79a4b868976a011043345fbef2cb088dd799757ec3970480eb99d9f2e92
SHA512b2c4c5b6bc5519ebb8e701c37eb298f6bdbb89b09bbf93a4f5c7a0e5b809b7bb3a6355087797e5064c1cc67a1555cbdab782fcba2f8a9d0f18d4f53337a34ea9
-
Filesize
258KB
MD52b9115c055bf6678d583c6c59b4bb6d7
SHA178000ca3f212f7ae00068878e5ca8b40a79851a5
SHA25677db2bbc259a7504a9a0956a204f9aa7d83960cc886e79ec05f5f7f545dc3969
SHA51255ed7ae641234dcf789a7b2c0b5ecb92b702959ef7a8bd521e9dca7314e830a4a0571ef757d9a7a03c15db0be2d71a838892ab7a3bc2c31331509d499a74ad0f
-
Filesize
258KB
MD52b9115c055bf6678d583c6c59b4bb6d7
SHA178000ca3f212f7ae00068878e5ca8b40a79851a5
SHA25677db2bbc259a7504a9a0956a204f9aa7d83960cc886e79ec05f5f7f545dc3969
SHA51255ed7ae641234dcf789a7b2c0b5ecb92b702959ef7a8bd521e9dca7314e830a4a0571ef757d9a7a03c15db0be2d71a838892ab7a3bc2c31331509d499a74ad0f
-
Filesize
258KB
MD52b9115c055bf6678d583c6c59b4bb6d7
SHA178000ca3f212f7ae00068878e5ca8b40a79851a5
SHA25677db2bbc259a7504a9a0956a204f9aa7d83960cc886e79ec05f5f7f545dc3969
SHA51255ed7ae641234dcf789a7b2c0b5ecb92b702959ef7a8bd521e9dca7314e830a4a0571ef757d9a7a03c15db0be2d71a838892ab7a3bc2c31331509d499a74ad0f
-
Filesize
258KB
MD52b9115c055bf6678d583c6c59b4bb6d7
SHA178000ca3f212f7ae00068878e5ca8b40a79851a5
SHA25677db2bbc259a7504a9a0956a204f9aa7d83960cc886e79ec05f5f7f545dc3969
SHA51255ed7ae641234dcf789a7b2c0b5ecb92b702959ef7a8bd521e9dca7314e830a4a0571ef757d9a7a03c15db0be2d71a838892ab7a3bc2c31331509d499a74ad0f
-
Filesize
258KB
MD52b9115c055bf6678d583c6c59b4bb6d7
SHA178000ca3f212f7ae00068878e5ca8b40a79851a5
SHA25677db2bbc259a7504a9a0956a204f9aa7d83960cc886e79ec05f5f7f545dc3969
SHA51255ed7ae641234dcf789a7b2c0b5ecb92b702959ef7a8bd521e9dca7314e830a4a0571ef757d9a7a03c15db0be2d71a838892ab7a3bc2c31331509d499a74ad0f