Analysis
-
max time kernel
145s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-10-2023 20:27
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.716ef8d98c386b918e04c8ad8927bb80.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.716ef8d98c386b918e04c8ad8927bb80.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.716ef8d98c386b918e04c8ad8927bb80.exe
-
Size
211KB
-
MD5
716ef8d98c386b918e04c8ad8927bb80
-
SHA1
16f0c51cee5692ee6c3d9f38bb5344416f31c241
-
SHA256
ccde3cd7126eba044db0a50d4f4c713660a5a9e3a4b9717b574aa40a9ec40509
-
SHA512
0d9c050ac6f68c82cc43c8bf72d9645cccdbed15e1f556bacb59e1cf48410b41960819d15c89cc7391f628bf9e0d21e47f2d3e218f08c018d2720bdd4c7ce34c
-
SSDEEP
3072:EPUHpiKT2t2UHIu05W7SAFJJOUD9cckiKop97f3r8n9t9YgntM:9rTfUHeeSKOS9ccFKk3Y9t9YJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2528 Isass.exe -
Loads dropped DLL 2 IoCs
pid Process 2832 NEAS.716ef8d98c386b918e04c8ad8927bb80.exe 2832 NEAS.716ef8d98c386b918e04c8ad8927bb80.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" NEAS.716ef8d98c386b918e04c8ad8927bb80.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" NEAS.716ef8d98c386b918e04c8ad8927bb80.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2832 NEAS.716ef8d98c386b918e04c8ad8927bb80.exe 2528 Isass.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2832 wrote to memory of 2528 2832 NEAS.716ef8d98c386b918e04c8ad8927bb80.exe 28 PID 2832 wrote to memory of 2528 2832 NEAS.716ef8d98c386b918e04c8ad8927bb80.exe 28 PID 2832 wrote to memory of 2528 2832 NEAS.716ef8d98c386b918e04c8ad8927bb80.exe 28 PID 2832 wrote to memory of 2528 2832 NEAS.716ef8d98c386b918e04c8ad8927bb80.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.716ef8d98c386b918e04c8ad8927bb80.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.716ef8d98c386b918e04c8ad8927bb80.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5716ef8d98c386b918e04c8ad8927bb80
SHA116f0c51cee5692ee6c3d9f38bb5344416f31c241
SHA256ccde3cd7126eba044db0a50d4f4c713660a5a9e3a4b9717b574aa40a9ec40509
SHA5120d9c050ac6f68c82cc43c8bf72d9645cccdbed15e1f556bacb59e1cf48410b41960819d15c89cc7391f628bf9e0d21e47f2d3e218f08c018d2720bdd4c7ce34c
-
Filesize
211KB
MD5716ef8d98c386b918e04c8ad8927bb80
SHA116f0c51cee5692ee6c3d9f38bb5344416f31c241
SHA256ccde3cd7126eba044db0a50d4f4c713660a5a9e3a4b9717b574aa40a9ec40509
SHA5120d9c050ac6f68c82cc43c8bf72d9645cccdbed15e1f556bacb59e1cf48410b41960819d15c89cc7391f628bf9e0d21e47f2d3e218f08c018d2720bdd4c7ce34c
-
Filesize
211KB
MD5716ef8d98c386b918e04c8ad8927bb80
SHA116f0c51cee5692ee6c3d9f38bb5344416f31c241
SHA256ccde3cd7126eba044db0a50d4f4c713660a5a9e3a4b9717b574aa40a9ec40509
SHA5120d9c050ac6f68c82cc43c8bf72d9645cccdbed15e1f556bacb59e1cf48410b41960819d15c89cc7391f628bf9e0d21e47f2d3e218f08c018d2720bdd4c7ce34c
-
Filesize
211KB
MD5716ef8d98c386b918e04c8ad8927bb80
SHA116f0c51cee5692ee6c3d9f38bb5344416f31c241
SHA256ccde3cd7126eba044db0a50d4f4c713660a5a9e3a4b9717b574aa40a9ec40509
SHA5120d9c050ac6f68c82cc43c8bf72d9645cccdbed15e1f556bacb59e1cf48410b41960819d15c89cc7391f628bf9e0d21e47f2d3e218f08c018d2720bdd4c7ce34c
-
Filesize
211KB
MD5716ef8d98c386b918e04c8ad8927bb80
SHA116f0c51cee5692ee6c3d9f38bb5344416f31c241
SHA256ccde3cd7126eba044db0a50d4f4c713660a5a9e3a4b9717b574aa40a9ec40509
SHA5120d9c050ac6f68c82cc43c8bf72d9645cccdbed15e1f556bacb59e1cf48410b41960819d15c89cc7391f628bf9e0d21e47f2d3e218f08c018d2720bdd4c7ce34c