Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 14:57

General

  • Target

    bfcb5ac7445b68c9ec418bbd1c19db30_NEAS.exe

  • Size

    2.7MB

  • MD5

    bfcb5ac7445b68c9ec418bbd1c19db30

  • SHA1

    a1fac4e668a4d54fc17461563136903613799841

  • SHA256

    d403274789ff5d379aa390b913f4695ed1508dd8278959bcdc66600ff5f808c6

  • SHA512

    e164c207db8804da0f4d82e76cd336f4025877dc290fba960c31cab65dc11a3c2551154fbe6375937ce34d7257554b6bce2e71542a825186c26b885726708ad9

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBk9w4Sx:+R0pI/IQlUoMPdmpSpC4

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bfcb5ac7445b68c9ec418bbd1c19db30_NEAS.exe
    "C:\Users\Admin\AppData\Local\Temp\bfcb5ac7445b68c9ec418bbd1c19db30_NEAS.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1176
    • C:\FilesJU\aoptiloc.exe
      C:\FilesJU\aoptiloc.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\LabZPL\bodxec.exe

    Filesize

    2.7MB

    MD5

    59ee35efd67b30bf35607c5229bf37d4

    SHA1

    7cadb87826702f034b9bd3d0bdc2862e68d200c0

    SHA256

    602308716f93923f5dba70908f33016cf2d66e8db9cdd8ce245ae5792cd6e70e

    SHA512

    b671eab8f0327993d6636f9fd589968b7e90ba82edbfdbb8e8c9a5c65d6cdf4eb690afd260f281f8b8a680a2bc3ccaf81a66b554e46ced6b5944019b128567be

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    200B

    MD5

    9d026a0219126537c9b7c28d361f6b97

    SHA1

    c0f2a180a0544df0caff8c9118299a80a91d1175

    SHA256

    bfb473ad34bf8c5f2534e950a5d7b0971397a5078abebfbf2e265f2bc997bf9e

    SHA512

    799e515f2965db9eee766ff64f4f3163ccffb2200b059684bc6840e39967be92f68aa1969af138056e232e192534c67d99b4cd703e37b074ff05bd483e4355e7

  • \FilesJU\aoptiloc.exe

    Filesize

    2.7MB

    MD5

    a8ae8a23eef1e6c34bdca7b418529c0f

    SHA1

    9e55caa3ca0a2c3c4f5586b497783a0774f1785a

    SHA256

    534df23a93c38cb73256e3a25da9546a648f1a1fef5777ffceb5f986f10bb222

    SHA512

    495263f5d537205cc895df526075e738ab0ad9aa585ffeb041c2683132d834ef4b5a95b517f1554dd98fabd0db85bce225e654c6ab5eb8e546ed73f9bd5d01ab