Analysis

  • max time kernel
    15s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2023, 20:25

General

  • Target

    NEAS.604132f4e87ebafb0c05f281644f0640.exe

  • Size

    515KB

  • MD5

    604132f4e87ebafb0c05f281644f0640

  • SHA1

    f12d899fb45f3cda893842e2f63931dd28e54acf

  • SHA256

    bc656911ecfc9b40ae4b33bf133886cfd7bb7ae22252a99e73ad3db53bf0aaf6

  • SHA512

    a125608f0b344330cec21d0a06591e4bb0659cdfc0f78dc99d9f90e161b7fe419da0bc3f4bf9e066d44abbe73b77f1a1506737f09ec10bdcbc643a38f9cf44b1

  • SSDEEP

    6144:WcNhJgX9z9TB0YRX8nPo+AdpbEPf4Qn65VGQgpYZPsIpSWZfX85:phJ6nTOYREPo3CPQosVhgwPst

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.604132f4e87ebafb0c05f281644f0640.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.604132f4e87ebafb0c05f281644f0640.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2988
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev5E84.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.604132f4e87ebafb0c05f281644f0640.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2584
      • C:\Users\Admin\AppData\Local\Temp\NEAS.604132F4E87EBAFB0C05F281644F0640.EXE
        3⤵
        • Executes dropped EXE
        PID:2748
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev5E84.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.604132F4E87EBAFB0C05F281644F0640.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2600

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\NEAS.604132F4E87EBAFB0C05F281644F0640.EXE

          Filesize

          515KB

          MD5

          4cb49a2bbd14dccc28feae63110087e8

          SHA1

          5e96b1d1e4914d63ae515a488cdc24b484005015

          SHA256

          1ecb976f38f602c5f15ebb5b7e18debe2db126e61ab46e4f5097a238daad2d3f

          SHA512

          6a83611dcc30e56c78625712a566a175ca91aeef6cf97e7d8590805c43f0cf4d35f69ea79b476ff5b99ba323b14d3176e28e7d84421a2061e2043c878027fc1d

        • C:\Users\Admin\AppData\Local\Temp\NEAS.604132F4E87EBAFB0C05F281644F0640.EXE

          Filesize

          515KB

          MD5

          4cb49a2bbd14dccc28feae63110087e8

          SHA1

          5e96b1d1e4914d63ae515a488cdc24b484005015

          SHA256

          1ecb976f38f602c5f15ebb5b7e18debe2db126e61ab46e4f5097a238daad2d3f

          SHA512

          6a83611dcc30e56c78625712a566a175ca91aeef6cf97e7d8590805c43f0cf4d35f69ea79b476ff5b99ba323b14d3176e28e7d84421a2061e2043c878027fc1d

        • C:\Users\Admin\AppData\Local\Temp\NEAS.604132f4e87ebafb0c05f281644f0640.exe

          Filesize

          259KB

          MD5

          a10bf0e8d40b78c8b0b43a6a6fed9207

          SHA1

          0999873e46ae4a8f6740aa826773037c94fc5e18

          SHA256

          3d921cc9c553941d646c34cc6a79259e530c4a7652abcdd4b680e923f45090f6

          SHA512

          76e0e75288b05de8f71e464c8d23f9d18f785a6abf86b61f388177f044b959fe10363a05fa6031184758ad869ff855d648bf05e32e48531208372e59e354a206

        • C:\Users\Admin\AppData\Local\Temp\NEAS.604132f4e87ebafb0c05f281644f0640.exe

          Filesize

          259KB

          MD5

          a10bf0e8d40b78c8b0b43a6a6fed9207

          SHA1

          0999873e46ae4a8f6740aa826773037c94fc5e18

          SHA256

          3d921cc9c553941d646c34cc6a79259e530c4a7652abcdd4b680e923f45090f6

          SHA512

          76e0e75288b05de8f71e464c8d23f9d18f785a6abf86b61f388177f044b959fe10363a05fa6031184758ad869ff855d648bf05e32e48531208372e59e354a206

        • C:\WINDOWS\MSWDM.EXE

          Filesize

          256KB

          MD5

          8a1198209520897514a2d82a912a66d2

          SHA1

          5dda8ec47f948814d808cd71e89ebe65940a1ff7

          SHA256

          5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

          SHA512

          9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

        • C:\Windows\MSWDM.EXE

          Filesize

          256KB

          MD5

          8a1198209520897514a2d82a912a66d2

          SHA1

          5dda8ec47f948814d808cd71e89ebe65940a1ff7

          SHA256

          5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

          SHA512

          9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

        • C:\Windows\MSWDM.EXE

          Filesize

          256KB

          MD5

          8a1198209520897514a2d82a912a66d2

          SHA1

          5dda8ec47f948814d808cd71e89ebe65940a1ff7

          SHA256

          5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

          SHA512

          9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

        • C:\Windows\MSWDM.EXE

          Filesize

          256KB

          MD5

          8a1198209520897514a2d82a912a66d2

          SHA1

          5dda8ec47f948814d808cd71e89ebe65940a1ff7

          SHA256

          5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

          SHA512

          9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

        • C:\Windows\MSWDM.EXE

          Filesize

          256KB

          MD5

          8a1198209520897514a2d82a912a66d2

          SHA1

          5dda8ec47f948814d808cd71e89ebe65940a1ff7

          SHA256

          5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

          SHA512

          9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

        • C:\Windows\dev5E84.tmp

          Filesize

          259KB

          MD5

          a10bf0e8d40b78c8b0b43a6a6fed9207

          SHA1

          0999873e46ae4a8f6740aa826773037c94fc5e18

          SHA256

          3d921cc9c553941d646c34cc6a79259e530c4a7652abcdd4b680e923f45090f6

          SHA512

          76e0e75288b05de8f71e464c8d23f9d18f785a6abf86b61f388177f044b959fe10363a05fa6031184758ad869ff855d648bf05e32e48531208372e59e354a206

        • \Users\Admin\AppData\Local\Temp\NEAS.604132f4e87ebafb0c05f281644f0640.exe

          Filesize

          259KB

          MD5

          a10bf0e8d40b78c8b0b43a6a6fed9207

          SHA1

          0999873e46ae4a8f6740aa826773037c94fc5e18

          SHA256

          3d921cc9c553941d646c34cc6a79259e530c4a7652abcdd4b680e923f45090f6

          SHA512

          76e0e75288b05de8f71e464c8d23f9d18f785a6abf86b61f388177f044b959fe10363a05fa6031184758ad869ff855d648bf05e32e48531208372e59e354a206

        • \Users\Admin\AppData\Local\Temp\NEAS.604132f4e87ebafb0c05f281644f0640.exe

          Filesize

          259KB

          MD5

          a10bf0e8d40b78c8b0b43a6a6fed9207

          SHA1

          0999873e46ae4a8f6740aa826773037c94fc5e18

          SHA256

          3d921cc9c553941d646c34cc6a79259e530c4a7652abcdd4b680e923f45090f6

          SHA512

          76e0e75288b05de8f71e464c8d23f9d18f785a6abf86b61f388177f044b959fe10363a05fa6031184758ad869ff855d648bf05e32e48531208372e59e354a206