Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 21:45
Behavioral task
behavioral1
Sample
04c6edff9076cefcc036da59a349bf6f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
04c6edff9076cefcc036da59a349bf6f.exe
Resource
win10v2004-20231222-en
General
-
Target
04c6edff9076cefcc036da59a349bf6f.exe
-
Size
242KB
-
MD5
04c6edff9076cefcc036da59a349bf6f
-
SHA1
a68cf988973fb17bb6e05803563dc4308735a611
-
SHA256
a1ea988c9b8bb71be31da72660d3ec18babe7b8aed1101d03ab62c0c037a6c87
-
SHA512
040376b7ade6f4a94d4c1d1e000a032367df90475bcc95a698370acc7cfff5b86d3c758932ee25ac7642f9b1cf25116d964aff9171f79e54922b625d0a6e7960
-
SSDEEP
6144:bYpSnN1sLYGShjWWrUNKnUiyPZ+QQieWB6CFlH4/F5uQiOB:bYpSN1Eni2iyZ+SPFq9AQiOB
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
04c6edff9076cefcc036da59a349bf6f.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe" 04c6edff9076cefcc036da59a349bf6f.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 3052 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
necq.exepid process 2576 necq.exe -
Loads dropped DLL 2 IoCs
Processes:
04c6edff9076cefcc036da59a349bf6f.exepid process 2660 04c6edff9076cefcc036da59a349bf6f.exe 2660 04c6edff9076cefcc036da59a349bf6f.exe -
Processes:
resource yara_rule behavioral1/memory/2660-1-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2660-2-0x0000000000400000-0x0000000000497000-memory.dmp upx C:\Users\Admin\necq.exe upx behavioral1/memory/2576-20-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
04c6edff9076cefcc036da59a349bf6f.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "C:\\Users\\Admin\\necq.exe \\u" 04c6edff9076cefcc036da59a349bf6f.exe -
Drops file in System32 directory 3 IoCs
Processes:
04c6edff9076cefcc036da59a349bf6f.exenecq.exedescription ioc process File opened for modification C:\Windows\SysWOW64\secupdat.dat 04c6edff9076cefcc036da59a349bf6f.exe File created C:\Windows\SysWOW64\secupdat.dat 04c6edff9076cefcc036da59a349bf6f.exe File opened for modification C:\Windows\SysWOW64\secupdat.dat necq.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
necq.exedescription pid process target process PID 2576 set thread context of 2648 2576 necq.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
04c6edff9076cefcc036da59a349bf6f.exenecq.exedescription pid process target process PID 2660 wrote to memory of 2576 2660 04c6edff9076cefcc036da59a349bf6f.exe necq.exe PID 2660 wrote to memory of 2576 2660 04c6edff9076cefcc036da59a349bf6f.exe necq.exe PID 2660 wrote to memory of 2576 2660 04c6edff9076cefcc036da59a349bf6f.exe necq.exe PID 2660 wrote to memory of 2576 2660 04c6edff9076cefcc036da59a349bf6f.exe necq.exe PID 2660 wrote to memory of 3052 2660 04c6edff9076cefcc036da59a349bf6f.exe cmd.exe PID 2660 wrote to memory of 3052 2660 04c6edff9076cefcc036da59a349bf6f.exe cmd.exe PID 2660 wrote to memory of 3052 2660 04c6edff9076cefcc036da59a349bf6f.exe cmd.exe PID 2660 wrote to memory of 3052 2660 04c6edff9076cefcc036da59a349bf6f.exe cmd.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe PID 2576 wrote to memory of 2648 2576 necq.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\04c6edff9076cefcc036da59a349bf6f.exe"C:\Users\Admin\AppData\Local\Temp\04c6edff9076cefcc036da59a349bf6f.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\necq.exe\u2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2262.bat" "2⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2262.batFilesize
103B
MD59cba6e45ae8ca1c18d44385dc6576f1a
SHA1aef15effb6a4002c14dc9c39e40f16befae1cf39
SHA2561ce070d97234a2cbc86173691944fae7e3889025483ce70dd839d27209fbd6be
SHA5124c9895a743ea0eba0d5fb4e738721246aacde72befe6581bbd2281fa6a6856eca28e788e0ac74b6b3bff2ad6ca591ecda020dc4263f6f324ee55a38edede5601
-
C:\Users\Admin\necq.exeFilesize
20KB
MD5aa1ae29b65b47d5d21cd2a0fdadb4dc1
SHA1a62409fb17f40ae7e43bec05daa89c08c50a744d
SHA256dd4d67eedb592dc144af40a8f529f6f8470e78dce9c474056451dc2aa069a69b
SHA51227a83a83bdcc9b21e9e54948d9829820ed7f5801f8b48cdd08d8f638b3d914d2fb7442a455bfea26967025c9682a792ff6624600a04305bd539bc84ec93dae0e
-
C:\Windows\SysWOW64\secupdat.datFilesize
70KB
MD5385d72644b16a26bdf2681015dd6faf9
SHA16fb47623bce4623f5b66041fd11c0cbe8cc13e64
SHA256ad09d7cc3d40cc4aba78a1979b879d753fa7bf91235a798bd2c979f91effde34
SHA512954c54969cf3de29dbca52b7f864ee74907207a8bc5f234d12d0d2d393ff2c59518b80fedce1ee7963e603d303f0513d098dc47fa7151e57de16bf81bdec9037
-
memory/2576-142-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/2576-20-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/2576-30-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/2648-69-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-86-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-32-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-33-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-47-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-56-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-91-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-34-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-148-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2648-90-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-89-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-88-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-87-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-66-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-85-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-84-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-83-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-82-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-81-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-80-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-79-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-78-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-77-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-76-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-65-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-74-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-73-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-72-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-71-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-70-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-35-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-68-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-59-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-36-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-75-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-64-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-63-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-62-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-61-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-60-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-67-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-58-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-57-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-55-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-54-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-53-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-52-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-51-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-50-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-49-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-48-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-46-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-45-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-44-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-43-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-42-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-39-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-41-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-40-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-38-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2648-37-0x0000000009900000-0x0000000009915000-memory.dmpFilesize
84KB
-
memory/2660-3-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/2660-1-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/2660-2-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/2660-17-0x00000000002D0000-0x00000000002ED000-memory.dmpFilesize
116KB
-
memory/2660-9-0x00000000002C0000-0x00000000002C1000-memory.dmpFilesize
4KB
-
memory/2660-19-0x00000000002D0000-0x00000000002ED000-memory.dmpFilesize
116KB
-
memory/2660-28-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB