Analysis
-
max time kernel
143s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-10-2023 20:13
Behavioral task
behavioral1
Sample
NEAS.4133683572cb62e06e64c43a6dc2d570.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.4133683572cb62e06e64c43a6dc2d570.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.4133683572cb62e06e64c43a6dc2d570.exe
-
Size
89KB
-
MD5
4133683572cb62e06e64c43a6dc2d570
-
SHA1
e105eda7016f322a29ee946d5abffc0b18b1f4af
-
SHA256
714d943dc2eef46c77f96c349eee97c4e481b27bc4ea2289833fa6326c93e53d
-
SHA512
398b9a278c8eae902c97b5835ff22e24e78ac0298d1e656de17c2ad03f1bd26088e41316cecddb6fff9bff3668c8563336f65cf76e69f9ca71c131a7d913b058
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpa:AnBdOOtEvwDpj6zV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2152 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2148 NEAS.4133683572cb62e06e64c43a6dc2d570.exe -
resource yara_rule behavioral1/memory/2148-0-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x000a000000012273-11.dat upx behavioral1/memory/2148-12-0x0000000001FF0000-0x0000000001FFF000-memory.dmp upx behavioral1/files/0x000a000000012273-16.dat upx behavioral1/memory/2152-18-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/memory/2148-15-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x000a000000012273-26.dat upx behavioral1/memory/2152-27-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2152 2148 NEAS.4133683572cb62e06e64c43a6dc2d570.exe 28 PID 2148 wrote to memory of 2152 2148 NEAS.4133683572cb62e06e64c43a6dc2d570.exe 28 PID 2148 wrote to memory of 2152 2148 NEAS.4133683572cb62e06e64c43a6dc2d570.exe 28 PID 2148 wrote to memory of 2152 2148 NEAS.4133683572cb62e06e64c43a6dc2d570.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.4133683572cb62e06e64c43a6dc2d570.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.4133683572cb62e06e64c43a6dc2d570.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD560badfa89c4ca46ddc653538323c8fb4
SHA1512ea47b61a3dc5334c11a642552dfa8814079d8
SHA2566267649a740de6c325797f368733d4781af477bd51550dbd7e85272783b24577
SHA512f7875b3fa9e684229aa84eecfe20e286ea7ab887aecf55f660a0286dc3cee78d1caa5bc23f4f48d86cd4c0398afb1602dfd2b84626b66dd496abaef61f93ee03
-
Filesize
89KB
MD560badfa89c4ca46ddc653538323c8fb4
SHA1512ea47b61a3dc5334c11a642552dfa8814079d8
SHA2566267649a740de6c325797f368733d4781af477bd51550dbd7e85272783b24577
SHA512f7875b3fa9e684229aa84eecfe20e286ea7ab887aecf55f660a0286dc3cee78d1caa5bc23f4f48d86cd4c0398afb1602dfd2b84626b66dd496abaef61f93ee03
-
Filesize
89KB
MD560badfa89c4ca46ddc653538323c8fb4
SHA1512ea47b61a3dc5334c11a642552dfa8814079d8
SHA2566267649a740de6c325797f368733d4781af477bd51550dbd7e85272783b24577
SHA512f7875b3fa9e684229aa84eecfe20e286ea7ab887aecf55f660a0286dc3cee78d1caa5bc23f4f48d86cd4c0398afb1602dfd2b84626b66dd496abaef61f93ee03