Analysis

  • max time kernel
    29s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2023 20:23

General

  • Target

    NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe

  • Size

    1.8MB

  • MD5

    534d6d8055cd45ece7d82abf8304f5d0

  • SHA1

    d278deeb5247429c3e07253bb5560deab57f21a9

  • SHA256

    2690b8e4bedbec81acfd83ecdda4fbb16de820469ece6177aa3960e172c8aad8

  • SHA512

    b926b1a63ccd8042520125f09b761c25659171d81ef19357e460eaa9d32c6783d281647b4212f365d7dd57c02c0b4e5f252f50884c07381e229d2f2be9046ab6

  • SSDEEP

    49152:MtccS4neHbyfYTOYKPu/gEjiEO5ItDVr+:Mt9S4neHvZjiEO5Ihg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:420
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:4800
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev2E20.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4444
      • C:\Users\Admin\AppData\Local\Temp\NEAS.534D6D8055CD45ECE7D82ABF8304F5D0.EXE
        3⤵
        • Executes dropped EXE
        PID:1872
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev2E20.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.534D6D8055CD45ECE7D82ABF8304F5D0.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:4956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\NEAS.534D6D8055CD45ECE7D82ABF8304F5D0.EXE

    Filesize

    1.8MB

    MD5

    85b919afc97b075df8d1f0ba4b807636

    SHA1

    c649c9188778c67f0f40fbe08b5eecfd00614822

    SHA256

    0d9f1834481f2314cda96ff64806296c9b0de1db17f61f18bc63411f398b6788

    SHA512

    704101d5afa6f38f66ebffca63e82e660dedb505d55d00fdff256a606fbbd3fefa4526d1c4204a0461d4c27cddce4fc4297079d16d49ca66786833bbd5164710

  • C:\Users\Admin\AppData\Local\Temp\NEAS.534D6D8055CD45ECE7D82ABF8304F5D0.EXE

    Filesize

    1.8MB

    MD5

    85b919afc97b075df8d1f0ba4b807636

    SHA1

    c649c9188778c67f0f40fbe08b5eecfd00614822

    SHA256

    0d9f1834481f2314cda96ff64806296c9b0de1db17f61f18bc63411f398b6788

    SHA512

    704101d5afa6f38f66ebffca63e82e660dedb505d55d00fdff256a606fbbd3fefa4526d1c4204a0461d4c27cddce4fc4297079d16d49ca66786833bbd5164710

  • C:\Users\Admin\AppData\Local\Temp\NEAS.534d6d8055cd45ece7d82abf8304f5d0.exe

    Filesize

    10KB

    MD5

    bf2411bc726873efb646f8b47f3e4efe

    SHA1

    225a0b4dc3a79bfaf8496a3185026b0a5340ea6b

    SHA256

    972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd

    SHA512

    fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2

  • C:\WINDOWS\MSWDM.EXE

    Filesize

    1.8MB

    MD5

    10328584cd84654f69421ffa92ab0bc8

    SHA1

    2cd56c7a99b5355de58f28465c66957c48048860

    SHA256

    6d83622a8a63a23fd0ab6b24f33341f5f18e912b2a99019ccf8ec8ba38fa33b9

    SHA512

    7a4caa3cc66a7e59c53cfe6405a13ce177764180d140dba1732d874b346a5e7d2d325e8346635583e1204ecabf9123454eb72719881ce1d50780bb8798ae5e45

  • C:\Windows\MSWDM.EXE

    Filesize

    1.8MB

    MD5

    10328584cd84654f69421ffa92ab0bc8

    SHA1

    2cd56c7a99b5355de58f28465c66957c48048860

    SHA256

    6d83622a8a63a23fd0ab6b24f33341f5f18e912b2a99019ccf8ec8ba38fa33b9

    SHA512

    7a4caa3cc66a7e59c53cfe6405a13ce177764180d140dba1732d874b346a5e7d2d325e8346635583e1204ecabf9123454eb72719881ce1d50780bb8798ae5e45

  • C:\Windows\MSWDM.EXE

    Filesize

    1.8MB

    MD5

    10328584cd84654f69421ffa92ab0bc8

    SHA1

    2cd56c7a99b5355de58f28465c66957c48048860

    SHA256

    6d83622a8a63a23fd0ab6b24f33341f5f18e912b2a99019ccf8ec8ba38fa33b9

    SHA512

    7a4caa3cc66a7e59c53cfe6405a13ce177764180d140dba1732d874b346a5e7d2d325e8346635583e1204ecabf9123454eb72719881ce1d50780bb8798ae5e45

  • C:\Windows\MSWDM.EXE

    Filesize

    1.8MB

    MD5

    10328584cd84654f69421ffa92ab0bc8

    SHA1

    2cd56c7a99b5355de58f28465c66957c48048860

    SHA256

    6d83622a8a63a23fd0ab6b24f33341f5f18e912b2a99019ccf8ec8ba38fa33b9

    SHA512

    7a4caa3cc66a7e59c53cfe6405a13ce177764180d140dba1732d874b346a5e7d2d325e8346635583e1204ecabf9123454eb72719881ce1d50780bb8798ae5e45

  • C:\Windows\dev2E20.tmp

    Filesize

    10KB

    MD5

    bf2411bc726873efb646f8b47f3e4efe

    SHA1

    225a0b4dc3a79bfaf8496a3185026b0a5340ea6b

    SHA256

    972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd

    SHA512

    fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2

  • memory/420-7-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/420-0-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1872-12-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/4444-19-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4800-20-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4956-17-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB