Analysis

  • max time kernel
    186s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2023, 08:19

General

  • Target

    NEAS.e0dbd21ca72a28b1447b1e49110b2160.exe

  • Size

    932KB

  • MD5

    e0dbd21ca72a28b1447b1e49110b2160

  • SHA1

    93cdb50beab354560a034f979b4d069da07e14f8

  • SHA256

    b9db76350af25816d2fd2f3a43de3d22f43ee82684a78dbef3e4f90259b88fab

  • SHA512

    8b3cae7c523a11b67c7ee9e151d47c7b9b4602240c89d694f7a82922d9ee14ebfe7bc307dc6e684006f8f48b62a273c8c082c11ad478ebbf4f08ecaf4431ca08

  • SSDEEP

    24576:P1/aGLDCM4D8ayGMZo8/Kf6EGdlvZ2eZCGy5csehLPayhqbLXyaXv+R:gD8ayGMZoTf6EGdlvZ2AJy5c3LPacqbg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.e0dbd21ca72a28b1447b1e49110b2160.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.e0dbd21ca72a28b1447b1e49110b2160.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2584
    • C:\ProgramData\alnmf.exe
      "C:\ProgramData\alnmf.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:4840

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Documents and Settings .exe

          Filesize

          932KB

          MD5

          852e70ebbf89e546ea7afc3024fa435f

          SHA1

          94588dfb1236be108e822a0b67fcc66f3d4ddf08

          SHA256

          c2318a1eb2a7e2083fa93d0d8910cf672fea6de04a03f2690bb14e5f641d7940

          SHA512

          0cb1e7868b3ccf153d52a17114be29b29bf2569bda6f6a6ce310da623e00fb027dd2e514b90df95674f98b92cb0091ad689f8d7714b812dc00e56a6d5a6f2dc7

        • C:\ProgramData\Saaaalamm\Mira.h

          Filesize

          477KB

          MD5

          70d6cb7dd01ebd5a21af02945d2ae12f

          SHA1

          05260b3e17a221e66b58d1e5ed1d0f518392159a

          SHA256

          136fb79a4b868976a011043345fbef2cb088dd799757ec3970480eb99d9f2e92

          SHA512

          b2c4c5b6bc5519ebb8e701c37eb298f6bdbb89b09bbf93a4f5c7a0e5b809b7bb3a6355087797e5064c1cc67a1555cbdab782fcba2f8a9d0f18d4f53337a34ea9

        • C:\ProgramData\Saaaalamm\Mira.h

          Filesize

          477KB

          MD5

          70d6cb7dd01ebd5a21af02945d2ae12f

          SHA1

          05260b3e17a221e66b58d1e5ed1d0f518392159a

          SHA256

          136fb79a4b868976a011043345fbef2cb088dd799757ec3970480eb99d9f2e92

          SHA512

          b2c4c5b6bc5519ebb8e701c37eb298f6bdbb89b09bbf93a4f5c7a0e5b809b7bb3a6355087797e5064c1cc67a1555cbdab782fcba2f8a9d0f18d4f53337a34ea9

        • C:\ProgramData\alnmf.exe

          Filesize

          454KB

          MD5

          47df574859f63a374bd53d5547df2829

          SHA1

          1b07df9f450870d5215844d661d0281853bb7dc5

          SHA256

          0adb3e09c8eb7caa537fd16d01083f6a7843969033a4719fe27376767b8a8c68

          SHA512

          83248c557a4bf5d8484decae5a28f693e48863974cfecf5f389a96f76a7f095c96680fc50a01e3c3d4a19834e821d446941d88591be367fe17ac6d4e7a1b33fa

        • C:\ProgramData\alnmf.exe

          Filesize

          454KB

          MD5

          47df574859f63a374bd53d5547df2829

          SHA1

          1b07df9f450870d5215844d661d0281853bb7dc5

          SHA256

          0adb3e09c8eb7caa537fd16d01083f6a7843969033a4719fe27376767b8a8c68

          SHA512

          83248c557a4bf5d8484decae5a28f693e48863974cfecf5f389a96f76a7f095c96680fc50a01e3c3d4a19834e821d446941d88591be367fe17ac6d4e7a1b33fa

        • memory/2584-7-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/4840-45-0x0000000000400000-0x0000000000448000-memory.dmp

          Filesize

          288KB

        • memory/4840-72-0x0000000000400000-0x0000000000448000-memory.dmp

          Filesize

          288KB

        • memory/4840-191-0x0000000000400000-0x0000000000448000-memory.dmp

          Filesize

          288KB

        • memory/4840-284-0x0000000000400000-0x0000000000448000-memory.dmp

          Filesize

          288KB