Analysis
-
max time kernel
15s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.604132f4e87ebafb0c05f281644f0640.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.604132f4e87ebafb0c05f281644f0640.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.604132f4e87ebafb0c05f281644f0640.exe
-
Size
515KB
-
MD5
604132f4e87ebafb0c05f281644f0640
-
SHA1
f12d899fb45f3cda893842e2f63931dd28e54acf
-
SHA256
bc656911ecfc9b40ae4b33bf133886cfd7bb7ae22252a99e73ad3db53bf0aaf6
-
SHA512
a125608f0b344330cec21d0a06591e4bb0659cdfc0f78dc99d9f90e161b7fe419da0bc3f4bf9e066d44abbe73b77f1a1506737f09ec10bdcbc643a38f9cf44b1
-
SSDEEP
6144:WcNhJgX9z9TB0YRX8nPo+AdpbEPf4Qn65VGQgpYZPsIpSWZfX85:phJ6nTOYREPo3CPQosVhgwPst
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2988 MSWDM.EXE 2584 MSWDM.EXE 2748 NEAS.604132F4E87EBAFB0C05F281644F0640.EXE 2600 MSWDM.EXE -
Loads dropped DLL 2 IoCs
pid Process 2584 MSWDM.EXE 2584 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" NEAS.604132f4e87ebafb0c05f281644f0640.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" NEAS.604132f4e87ebafb0c05f281644f0640.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE NEAS.604132f4e87ebafb0c05f281644f0640.exe File opened for modification C:\Windows\dev5E84.tmp NEAS.604132f4e87ebafb0c05f281644f0640.exe File opened for modification C:\Windows\dev5E84.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2584 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2988 1724 NEAS.604132f4e87ebafb0c05f281644f0640.exe 28 PID 1724 wrote to memory of 2988 1724 NEAS.604132f4e87ebafb0c05f281644f0640.exe 28 PID 1724 wrote to memory of 2988 1724 NEAS.604132f4e87ebafb0c05f281644f0640.exe 28 PID 1724 wrote to memory of 2988 1724 NEAS.604132f4e87ebafb0c05f281644f0640.exe 28 PID 1724 wrote to memory of 2584 1724 NEAS.604132f4e87ebafb0c05f281644f0640.exe 29 PID 1724 wrote to memory of 2584 1724 NEAS.604132f4e87ebafb0c05f281644f0640.exe 29 PID 1724 wrote to memory of 2584 1724 NEAS.604132f4e87ebafb0c05f281644f0640.exe 29 PID 1724 wrote to memory of 2584 1724 NEAS.604132f4e87ebafb0c05f281644f0640.exe 29 PID 2584 wrote to memory of 2748 2584 MSWDM.EXE 30 PID 2584 wrote to memory of 2748 2584 MSWDM.EXE 30 PID 2584 wrote to memory of 2748 2584 MSWDM.EXE 30 PID 2584 wrote to memory of 2748 2584 MSWDM.EXE 30 PID 2584 wrote to memory of 2600 2584 MSWDM.EXE 32 PID 2584 wrote to memory of 2600 2584 MSWDM.EXE 32 PID 2584 wrote to memory of 2600 2584 MSWDM.EXE 32 PID 2584 wrote to memory of 2600 2584 MSWDM.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.604132f4e87ebafb0c05f281644f0640.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.604132f4e87ebafb0c05f281644f0640.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2988
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev5E84.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.604132f4e87ebafb0c05f281644f0640.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\NEAS.604132F4E87EBAFB0C05F281644F0640.EXE
- Executes dropped EXE
PID:2748
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev5E84.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.604132F4E87EBAFB0C05F281644F0640.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2600
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
515KB
MD54cb49a2bbd14dccc28feae63110087e8
SHA15e96b1d1e4914d63ae515a488cdc24b484005015
SHA2561ecb976f38f602c5f15ebb5b7e18debe2db126e61ab46e4f5097a238daad2d3f
SHA5126a83611dcc30e56c78625712a566a175ca91aeef6cf97e7d8590805c43f0cf4d35f69ea79b476ff5b99ba323b14d3176e28e7d84421a2061e2043c878027fc1d
-
Filesize
515KB
MD54cb49a2bbd14dccc28feae63110087e8
SHA15e96b1d1e4914d63ae515a488cdc24b484005015
SHA2561ecb976f38f602c5f15ebb5b7e18debe2db126e61ab46e4f5097a238daad2d3f
SHA5126a83611dcc30e56c78625712a566a175ca91aeef6cf97e7d8590805c43f0cf4d35f69ea79b476ff5b99ba323b14d3176e28e7d84421a2061e2043c878027fc1d
-
Filesize
259KB
MD5a10bf0e8d40b78c8b0b43a6a6fed9207
SHA10999873e46ae4a8f6740aa826773037c94fc5e18
SHA2563d921cc9c553941d646c34cc6a79259e530c4a7652abcdd4b680e923f45090f6
SHA51276e0e75288b05de8f71e464c8d23f9d18f785a6abf86b61f388177f044b959fe10363a05fa6031184758ad869ff855d648bf05e32e48531208372e59e354a206
-
Filesize
259KB
MD5a10bf0e8d40b78c8b0b43a6a6fed9207
SHA10999873e46ae4a8f6740aa826773037c94fc5e18
SHA2563d921cc9c553941d646c34cc6a79259e530c4a7652abcdd4b680e923f45090f6
SHA51276e0e75288b05de8f71e464c8d23f9d18f785a6abf86b61f388177f044b959fe10363a05fa6031184758ad869ff855d648bf05e32e48531208372e59e354a206
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
259KB
MD5a10bf0e8d40b78c8b0b43a6a6fed9207
SHA10999873e46ae4a8f6740aa826773037c94fc5e18
SHA2563d921cc9c553941d646c34cc6a79259e530c4a7652abcdd4b680e923f45090f6
SHA51276e0e75288b05de8f71e464c8d23f9d18f785a6abf86b61f388177f044b959fe10363a05fa6031184758ad869ff855d648bf05e32e48531208372e59e354a206
-
Filesize
259KB
MD5a10bf0e8d40b78c8b0b43a6a6fed9207
SHA10999873e46ae4a8f6740aa826773037c94fc5e18
SHA2563d921cc9c553941d646c34cc6a79259e530c4a7652abcdd4b680e923f45090f6
SHA51276e0e75288b05de8f71e464c8d23f9d18f785a6abf86b61f388177f044b959fe10363a05fa6031184758ad869ff855d648bf05e32e48531208372e59e354a206
-
Filesize
259KB
MD5a10bf0e8d40b78c8b0b43a6a6fed9207
SHA10999873e46ae4a8f6740aa826773037c94fc5e18
SHA2563d921cc9c553941d646c34cc6a79259e530c4a7652abcdd4b680e923f45090f6
SHA51276e0e75288b05de8f71e464c8d23f9d18f785a6abf86b61f388177f044b959fe10363a05fa6031184758ad869ff855d648bf05e32e48531208372e59e354a206