Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 20:12
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.320d339903f9576f01490d6c8b1de960.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.320d339903f9576f01490d6c8b1de960.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.320d339903f9576f01490d6c8b1de960.exe
-
Size
136KB
-
MD5
320d339903f9576f01490d6c8b1de960
-
SHA1
b3892de453d3dfb543e57892c279252826842417
-
SHA256
f4888dc6ef03bd2dc7cdb1fd8c86bd91bd277eaa035359314ff9c16ce4aeffbb
-
SHA512
5b56778009fabd43e4f52ac840c3139b14b9bce91deda28acdf1fe4b06811997634ddd3578e1f8c2b8f72fccb780a102e542c3db0f4368ff5e6a0bb6093b30d1
-
SSDEEP
3072:26pQc+sSxnTrGadgsFqZeo4pwkhUmZr3hPsOraSo:26p2sSxTrGvsFUejWyZr3hPswaH
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2096 NEAS.320d339903f9576f01490d6c8b1de960.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2096 wrote to memory of 3044 2096 NEAS.320d339903f9576f01490d6c8b1de960.exe 28 PID 2096 wrote to memory of 3044 2096 NEAS.320d339903f9576f01490d6c8b1de960.exe 28 PID 2096 wrote to memory of 3044 2096 NEAS.320d339903f9576f01490d6c8b1de960.exe 28 PID 2096 wrote to memory of 3044 2096 NEAS.320d339903f9576f01490d6c8b1de960.exe 28 PID 3044 wrote to memory of 2868 3044 cmd.exe 32 PID 3044 wrote to memory of 2868 3044 cmd.exe 32 PID 3044 wrote to memory of 2868 3044 cmd.exe 32 PID 3044 wrote to memory of 2868 3044 cmd.exe 32 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2868 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.320d339903f9576f01490d6c8b1de960.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.320d339903f9576f01490d6c8b1de960.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ProgramData\exjE71D.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\NEAS.320d339903f9576f01490d6c8b1de960.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\NEAS.320d339903f9576f01490d6c8b1de960.exe"3⤵
- Views/modifies file attributes
PID:2868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53B
MD5cfc59ba56134249edc0ae4f2c9a8fd68
SHA19b0b67ef5efa4d0679053c01cdee26a0dc3a7eeb
SHA2562085557e0dc8cb35f255b17170294d6d6d18c6447316cd56525dcbb2428e8d69
SHA5123233338794c750fa4ac0fb9d3674345c51372878e72774be00cf99fbc34eefd916497d4ba94067712c1c8e390dcb23553d35634abdde714f377722a8d96d0000
-
Filesize
53B
MD5cfc59ba56134249edc0ae4f2c9a8fd68
SHA19b0b67ef5efa4d0679053c01cdee26a0dc3a7eeb
SHA2562085557e0dc8cb35f255b17170294d6d6d18c6447316cd56525dcbb2428e8d69
SHA5123233338794c750fa4ac0fb9d3674345c51372878e72774be00cf99fbc34eefd916497d4ba94067712c1c8e390dcb23553d35634abdde714f377722a8d96d0000