Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-10-2023 20:12
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.3772b599876db19692d2d09043e955b0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.3772b599876db19692d2d09043e955b0.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.3772b599876db19692d2d09043e955b0.exe
-
Size
386KB
-
MD5
3772b599876db19692d2d09043e955b0
-
SHA1
62bc18e2a88dec058242de40ece7b01b76d67926
-
SHA256
acd9feac4b06e521e17ded7cfd98b5e548457fbab9e1bbda5c1962950ae027c4
-
SHA512
5563229813fa8f6ac097c9ccde09410db622ce971ddd5a444844d6d1045108a6cb7a55a2119b52c499b2daee6e8e119e90661569f4c6cda31adb565273aa972a
-
SSDEEP
12288:4plrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:kxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1680 Debugging.exe -
Loads dropped DLL 2 IoCs
pid Process 2104 NEAS.3772b599876db19692d2d09043e955b0.exe 2104 NEAS.3772b599876db19692d2d09043e955b0.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Education\Debugging.exe NEAS.3772b599876db19692d2d09043e955b0.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2104 NEAS.3772b599876db19692d2d09043e955b0.exe 2104 NEAS.3772b599876db19692d2d09043e955b0.exe 2104 NEAS.3772b599876db19692d2d09043e955b0.exe 2104 NEAS.3772b599876db19692d2d09043e955b0.exe 1680 Debugging.exe 1680 Debugging.exe 1680 Debugging.exe 1680 Debugging.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 1680 2104 NEAS.3772b599876db19692d2d09043e955b0.exe 28 PID 2104 wrote to memory of 1680 2104 NEAS.3772b599876db19692d2d09043e955b0.exe 28 PID 2104 wrote to memory of 1680 2104 NEAS.3772b599876db19692d2d09043e955b0.exe 28 PID 2104 wrote to memory of 1680 2104 NEAS.3772b599876db19692d2d09043e955b0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.3772b599876db19692d2d09043e955b0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.3772b599876db19692d2d09043e955b0.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files\Education\Debugging.exe"C:\Program Files\Education\Debugging.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1680
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
386KB
MD5122cb03fd10030168e64b2e4efacf59b
SHA1e13d4bf796abe035d4deca6c6e58a413f28c29e6
SHA2561224776a4b2528c513884778556993c490baaf14c51ec94db75d59009729a2fb
SHA5121c5722023983c7b13835edd078d0061bd2d09a832e4c92898a2f023adb0ea31b16dd08149669b30c1feae73635a94bc1480ff4df89ec63ef4627389f660ed448
-
Filesize
386KB
MD5122cb03fd10030168e64b2e4efacf59b
SHA1e13d4bf796abe035d4deca6c6e58a413f28c29e6
SHA2561224776a4b2528c513884778556993c490baaf14c51ec94db75d59009729a2fb
SHA5121c5722023983c7b13835edd078d0061bd2d09a832e4c92898a2f023adb0ea31b16dd08149669b30c1feae73635a94bc1480ff4df89ec63ef4627389f660ed448
-
Filesize
386KB
MD5122cb03fd10030168e64b2e4efacf59b
SHA1e13d4bf796abe035d4deca6c6e58a413f28c29e6
SHA2561224776a4b2528c513884778556993c490baaf14c51ec94db75d59009729a2fb
SHA5121c5722023983c7b13835edd078d0061bd2d09a832e4c92898a2f023adb0ea31b16dd08149669b30c1feae73635a94bc1480ff4df89ec63ef4627389f660ed448
-
Filesize
386KB
MD5122cb03fd10030168e64b2e4efacf59b
SHA1e13d4bf796abe035d4deca6c6e58a413f28c29e6
SHA2561224776a4b2528c513884778556993c490baaf14c51ec94db75d59009729a2fb
SHA5121c5722023983c7b13835edd078d0061bd2d09a832e4c92898a2f023adb0ea31b16dd08149669b30c1feae73635a94bc1480ff4df89ec63ef4627389f660ed448