Analysis

  • max time kernel
    151s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2023 20:14

General

  • Target

    NEAS.46479d9bb96f05bbd30bf47549a9da20.exe

  • Size

    84KB

  • MD5

    46479d9bb96f05bbd30bf47549a9da20

  • SHA1

    b468c2de75c830c58f6212356be7f00481310d4c

  • SHA256

    f5eb6ec1430af2df50d0d771a5b8b2e2e908f5427649efeeca2a147a6a179838

  • SHA512

    c6daf6169d81d74025df10dd006260d54614c9ba91dbc6a1d35b1b25d52bb43e92d828b78c1b395a6298901abc2e68c716533b769540a840907e8773d672c133

  • SSDEEP

    1536:zazWlKzJVcNp++yQNS6xNNCT2l8NE8llbpTaCJRpsWr6cdaQTJSvYYm78Mx5z:BFNpo6rIKlUE8fbkqRfbaQlaYYmL

Score
1/10

Malware Config

Signatures

  • Modifies registry class 21 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.46479d9bb96f05bbd30bf47549a9da20.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.46479d9bb96f05bbd30bf47549a9da20.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:4304
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
      2⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:3532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3532-0-0x00000158A5230000-0x00000158A5238000-memory.dmp

    Filesize

    32KB

  • memory/3532-1-0x00000158BF7A0000-0x00000158BF926000-memory.dmp

    Filesize

    1.5MB

  • memory/3532-2-0x00007FFF233D0000-0x00007FFF23E91000-memory.dmp

    Filesize

    10.8MB

  • memory/3532-3-0x00000158A6DA0000-0x00000158A6DB0000-memory.dmp

    Filesize

    64KB

  • memory/3532-4-0x00000158A6DA0000-0x00000158A6DB0000-memory.dmp

    Filesize

    64KB

  • memory/3532-11-0x00007FFF233D0000-0x00007FFF23E91000-memory.dmp

    Filesize

    10.8MB

  • memory/3532-12-0x00000158A6DA0000-0x00000158A6DB0000-memory.dmp

    Filesize

    64KB

  • memory/3532-13-0x00000158A6DA0000-0x00000158A6DB0000-memory.dmp

    Filesize

    64KB