Analysis
-
max time kernel
29s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 20:23
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe
-
Size
1.8MB
-
MD5
534d6d8055cd45ece7d82abf8304f5d0
-
SHA1
d278deeb5247429c3e07253bb5560deab57f21a9
-
SHA256
2690b8e4bedbec81acfd83ecdda4fbb16de820469ece6177aa3960e172c8aad8
-
SHA512
b926b1a63ccd8042520125f09b761c25659171d81ef19357e460eaa9d32c6783d281647b4212f365d7dd57c02c0b4e5f252f50884c07381e229d2f2be9046ab6
-
SSDEEP
49152:MtccS4neHbyfYTOYKPu/gEjiEO5ItDVr+:Mt9S4neHvZjiEO5Ihg
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 4800 MSWDM.EXE 4444 MSWDM.EXE 1872 NEAS.534D6D8055CD45ECE7D82ABF8304F5D0.EXE 4956 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe File opened for modification C:\Windows\dev2E20.tmp NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe File opened for modification C:\Windows\dev2E20.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4444 MSWDM.EXE 4444 MSWDM.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 420 wrote to memory of 4800 420 NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe 83 PID 420 wrote to memory of 4800 420 NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe 83 PID 420 wrote to memory of 4800 420 NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe 83 PID 420 wrote to memory of 4444 420 NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe 84 PID 420 wrote to memory of 4444 420 NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe 84 PID 420 wrote to memory of 4444 420 NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe 84 PID 4444 wrote to memory of 1872 4444 MSWDM.EXE 85 PID 4444 wrote to memory of 1872 4444 MSWDM.EXE 85 PID 4444 wrote to memory of 1872 4444 MSWDM.EXE 85 PID 4444 wrote to memory of 4956 4444 MSWDM.EXE 91 PID 4444 wrote to memory of 4956 4444 MSWDM.EXE 91 PID 4444 wrote to memory of 4956 4444 MSWDM.EXE 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:420 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4800
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev2E20.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\NEAS.534D6D8055CD45ECE7D82ABF8304F5D0.EXE
- Executes dropped EXE
PID:1872
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev2E20.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.534D6D8055CD45ECE7D82ABF8304F5D0.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4956
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD585b919afc97b075df8d1f0ba4b807636
SHA1c649c9188778c67f0f40fbe08b5eecfd00614822
SHA2560d9f1834481f2314cda96ff64806296c9b0de1db17f61f18bc63411f398b6788
SHA512704101d5afa6f38f66ebffca63e82e660dedb505d55d00fdff256a606fbbd3fefa4526d1c4204a0461d4c27cddce4fc4297079d16d49ca66786833bbd5164710
-
Filesize
1.8MB
MD585b919afc97b075df8d1f0ba4b807636
SHA1c649c9188778c67f0f40fbe08b5eecfd00614822
SHA2560d9f1834481f2314cda96ff64806296c9b0de1db17f61f18bc63411f398b6788
SHA512704101d5afa6f38f66ebffca63e82e660dedb505d55d00fdff256a606fbbd3fefa4526d1c4204a0461d4c27cddce4fc4297079d16d49ca66786833bbd5164710
-
Filesize
10KB
MD5bf2411bc726873efb646f8b47f3e4efe
SHA1225a0b4dc3a79bfaf8496a3185026b0a5340ea6b
SHA256972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd
SHA512fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2
-
Filesize
1.8MB
MD510328584cd84654f69421ffa92ab0bc8
SHA12cd56c7a99b5355de58f28465c66957c48048860
SHA2566d83622a8a63a23fd0ab6b24f33341f5f18e912b2a99019ccf8ec8ba38fa33b9
SHA5127a4caa3cc66a7e59c53cfe6405a13ce177764180d140dba1732d874b346a5e7d2d325e8346635583e1204ecabf9123454eb72719881ce1d50780bb8798ae5e45
-
Filesize
1.8MB
MD510328584cd84654f69421ffa92ab0bc8
SHA12cd56c7a99b5355de58f28465c66957c48048860
SHA2566d83622a8a63a23fd0ab6b24f33341f5f18e912b2a99019ccf8ec8ba38fa33b9
SHA5127a4caa3cc66a7e59c53cfe6405a13ce177764180d140dba1732d874b346a5e7d2d325e8346635583e1204ecabf9123454eb72719881ce1d50780bb8798ae5e45
-
Filesize
1.8MB
MD510328584cd84654f69421ffa92ab0bc8
SHA12cd56c7a99b5355de58f28465c66957c48048860
SHA2566d83622a8a63a23fd0ab6b24f33341f5f18e912b2a99019ccf8ec8ba38fa33b9
SHA5127a4caa3cc66a7e59c53cfe6405a13ce177764180d140dba1732d874b346a5e7d2d325e8346635583e1204ecabf9123454eb72719881ce1d50780bb8798ae5e45
-
Filesize
1.8MB
MD510328584cd84654f69421ffa92ab0bc8
SHA12cd56c7a99b5355de58f28465c66957c48048860
SHA2566d83622a8a63a23fd0ab6b24f33341f5f18e912b2a99019ccf8ec8ba38fa33b9
SHA5127a4caa3cc66a7e59c53cfe6405a13ce177764180d140dba1732d874b346a5e7d2d325e8346635583e1204ecabf9123454eb72719881ce1d50780bb8798ae5e45
-
Filesize
10KB
MD5bf2411bc726873efb646f8b47f3e4efe
SHA1225a0b4dc3a79bfaf8496a3185026b0a5340ea6b
SHA256972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd
SHA512fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2