Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 09:42
Behavioral task
behavioral1
Sample
adb243c1562b276d7f3b6c21e63ef226_NEAS.exe
Resource
win7-20240220-en
General
-
Target
adb243c1562b276d7f3b6c21e63ef226_NEAS.exe
-
Size
491KB
-
MD5
adb243c1562b276d7f3b6c21e63ef226
-
SHA1
52d972b2a7ee3aa7bf327abfac676e1a8adb8d90
-
SHA256
c4c6d76e36aa3cda944e1dda2e2eea5baa1cc8ad60ab7b2a64b907ba7f09b6f1
-
SHA512
77df9559d0d957c25d16e27c2068dd71ccd89961213610284ef16b556c9302705f948ac51d378b7e548d9f4f79d173a2fb87e4c75cf703faa586e2f12319a84b
-
SSDEEP
6144:KxBWeMRygxDLbHxlSBxzJb6B6q1gBFJV6AvRqsf6YU+FM+3Yn/fCXjQGDq+E:63MQIDKJxq+Xxvo0U+d3s/fCX0X
Malware Config
Extracted
urelas
121.88.5.183
218.54.30.235
Signatures
-
Deletes itself 1 IoCs
pid Process 2600 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2576 baivj.exe -
Loads dropped DLL 2 IoCs
pid Process 1856 adb243c1562b276d7f3b6c21e63ef226_NEAS.exe 1856 adb243c1562b276d7f3b6c21e63ef226_NEAS.exe -
resource yara_rule behavioral1/memory/1856-0-0x0000000000B40000-0x0000000000BE7000-memory.dmp upx behavioral1/files/0x0036000000015d21-4.dat upx behavioral1/memory/1856-11-0x00000000023C0000-0x0000000002467000-memory.dmp upx behavioral1/memory/2576-20-0x0000000000010000-0x00000000000B7000-memory.dmp upx behavioral1/memory/1856-22-0x0000000000B40000-0x0000000000BE7000-memory.dmp upx behavioral1/memory/2576-25-0x0000000000010000-0x00000000000B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1856 adb243c1562b276d7f3b6c21e63ef226_NEAS.exe 2576 baivj.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1856 wrote to memory of 2576 1856 adb243c1562b276d7f3b6c21e63ef226_NEAS.exe 28 PID 1856 wrote to memory of 2576 1856 adb243c1562b276d7f3b6c21e63ef226_NEAS.exe 28 PID 1856 wrote to memory of 2576 1856 adb243c1562b276d7f3b6c21e63ef226_NEAS.exe 28 PID 1856 wrote to memory of 2576 1856 adb243c1562b276d7f3b6c21e63ef226_NEAS.exe 28 PID 1856 wrote to memory of 2600 1856 adb243c1562b276d7f3b6c21e63ef226_NEAS.exe 29 PID 1856 wrote to memory of 2600 1856 adb243c1562b276d7f3b6c21e63ef226_NEAS.exe 29 PID 1856 wrote to memory of 2600 1856 adb243c1562b276d7f3b6c21e63ef226_NEAS.exe 29 PID 1856 wrote to memory of 2600 1856 adb243c1562b276d7f3b6c21e63ef226_NEAS.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\adb243c1562b276d7f3b6c21e63ef226_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\adb243c1562b276d7f3b6c21e63ef226_NEAS.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\baivj.exe"C:\Users\Admin\AppData\Local\Temp\baivj.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2576
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_sannuyex.bat" "2⤵
- Deletes itself
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
287B
MD53047d89116639bd6ddec56df91507139
SHA1a154dc7137ad0d955268a6b0699fa3bd9a2aecaa
SHA256184a57c41542defd4914dcba62b4fa57d4673b990529925ee7d3de0a64d33d45
SHA5128008a67177defb44c9ca55f37be4f6d3a057ffa2dc709726190094dc505b2d8c664a382b4d2e210377f6cad95854d20a4b8a14f183458fc1200b1b4da3a611f8
-
Filesize
512B
MD5321648e6ae6a294fc3c0e16944d32a63
SHA11575254f688390d3723b7ed6dc749af0ff420ade
SHA25628707c9d741e95faecee35cb913f87a9f476a9e58b98407a4d277c3673f032a0
SHA5126b4240c2bcf2c05409baf18a898cda956887086f91d5d60be8248ebb080c56b097dddbaed0135f2e645551839f2d83ffdab2c983aebc67dac327d3c610550c07
-
Filesize
491KB
MD575a8cd4e0fecf76508f7af1da3161f93
SHA1f9e8a702f9255a11ff13d6851ac542171ce6510d
SHA256745d72100cab080b091c5532ba26db3d2945906f3464bf1e4226f810932dbdab
SHA512a9ad613fb5224491ca4128b761a9830bbef708fa092ae6e0872c0fdabc7713ec862f622d9529f146021c0b4eb776a2315831d55b67a4eb9e9781b4712930ebe2