Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 13:45

General

  • Target

    38870718b00f8c1a8805c749a7bd25d5.exe

  • Size

    80KB

  • MD5

    38870718b00f8c1a8805c749a7bd25d5

  • SHA1

    8a994c7ca298c208ec5335dfa70924825476de24

  • SHA256

    29ad44098ae43b5be9ceb1d62686ad32b13675381c8549d6ef7abe1818cb67df

  • SHA512

    e5979a2e2306ab88af21d437071601797395b80ce577125f969adfdf3b29423e2dd83a9aa25d5b2f60cb7192a0d9e8eadbbe2ce47155c44f24b7de672985c85c

  • SSDEEP

    1536:vL7wLwvKGlTGQxguIxZTAwlpwFJ0T72mocT:DowvrKxZfUFJ0T72mBT

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38870718b00f8c1a8805c749a7bd25d5.exe
    "C:\Users\Admin\AppData\Local\Temp\38870718b00f8c1a8805c749a7bd25d5.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Users\Admin\neabu.exe
      "C:\Users\Admin\neabu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\neabu.exe

    Filesize

    5KB

    MD5

    1ccccbe8c31f0c7fc54df6a350f56f03

    SHA1

    b909f1030cf68d43117f669e5b835c50ce30a9da

    SHA256

    c5ba714388b3545bc0153b3842f2cf4acbb978761195b931172b1b0d881e3ee2

    SHA512

    7b9c7ace1ed1aaac66b56ab0ba65152931ced7a1ce6fd7a05550f94c7b625484dd7145f12beb87d40ec42b2872f349e12394b2455fc197b401ea8ff89bd978a2

  • \Users\Admin\neabu.exe

    Filesize

    80KB

    MD5

    a807168c9854597d70d234cef290498a

    SHA1

    d3f0cb8b92e8a835232fd9c246c2e2518d1aa4a1

    SHA256

    a16fd678f276bc0a7ea37ba97843229d689929cf569838243a7d7ef5a576903d

    SHA512

    76f1c1b8711d720f8b5426a806b85f6088661de0438008ac763f9c02bfab314ed86315117988a1829245fc7e4555ebf27d4627145a5b46b0e3c02884ef18b57f