Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2023, 20:38

General

  • Target

    NEAS.c3d956530f2efcdf8376397aa1e44780.exe

  • Size

    92KB

  • MD5

    c3d956530f2efcdf8376397aa1e44780

  • SHA1

    2a8352efc656b21cdde917c568744cb52e513a8b

  • SHA256

    839342222e7dd3b5a4654c28e15e1ad8c6c6a678e56e917edfd91a36644b99bb

  • SHA512

    b02fa7c73ef9a5ffeaeaaf03cae1c541168beaddcd259e8c4a25c227a2404e65aec5f557ded4ede72d780edd84f7ec811efcb6ca1be1af6e1d3a294febaddf09

  • SSDEEP

    1536:W7ZhA7pApH9QHwtRF9ESWu0SWutlggalggyaRjvmujvmRzqzJ0CE+gLW3V4V2+A1:6e7WpHIyRF9ESWu0SWuDm84XE+gbna

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.c3d956530f2efcdf8376397aa1e44780.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.c3d956530f2efcdf8376397aa1e44780.exe"
    1⤵
      PID:2984
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:388
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2660

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2660-0-0x0000014F7FB50000-0x0000014F7FB60000-memory.dmp

              Filesize

              64KB

            • memory/2660-16-0x0000014F7FC50000-0x0000014F7FC60000-memory.dmp

              Filesize

              64KB

            • memory/2660-32-0x0000014F09600000-0x0000014F09601000-memory.dmp

              Filesize

              4KB

            • memory/2660-34-0x0000014F09630000-0x0000014F09631000-memory.dmp

              Filesize

              4KB

            • memory/2660-35-0x0000014F09630000-0x0000014F09631000-memory.dmp

              Filesize

              4KB

            • memory/2660-36-0x0000014F09740000-0x0000014F09741000-memory.dmp

              Filesize

              4KB