Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2023 08:23

General

  • Target

    NEAS.f7360409d0c58f335830de329debb1f0.exe

  • Size

    48KB

  • MD5

    f7360409d0c58f335830de329debb1f0

  • SHA1

    db093cd04d3f521a49d7b18211e8a4add3f338d9

  • SHA256

    58520880af8d86a5c96c276b7365fe9ab1b1e03d6813200e4796fa4403fcc4ed

  • SHA512

    6dbdff9bd073d523249819b9681b9bcd72b5f5e1c86e6d5a413527ff600fceab67c4ffac3c2a36494bae113c01390ded1aab75b0c5c829a6ca6fd588cfc0471c

  • SSDEEP

    384:dw2nwR2Fbql2alyVzJshA4FNPxXUfgCsApV2WCMuWl84IqGXhh19:dwowR6XaUVlYNPxkfLsApVZRP+4xGXhZ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.f7360409d0c58f335830de329debb1f0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.f7360409d0c58f335830de329debb1f0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Users\Admin\AppData\Local\Temp\hummy.exe
      "C:\Users\Admin\AppData\Local\Temp\hummy.exe"
      2⤵
      • Executes dropped EXE
      PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hummy.exe

    Filesize

    48KB

    MD5

    a7da8800511fe22d7eadca9cbdb27358

    SHA1

    971e02d83efe0035be1a7ef211a9bdf07f9f4980

    SHA256

    17a087192d4cb77fdfb74b25115e7c362ae4887d43e6f4520a2adfee0273cf14

    SHA512

    31796da96d1532ea5fc08599061c4dd5f2ff32b82d7f459f056341ed38dc41cc9d055ac3e225645052d38536b499d41cbe6563be3ff0fd0ea297ea56b9758495

  • C:\Users\Admin\AppData\Local\Temp\hummy.exe

    Filesize

    48KB

    MD5

    a7da8800511fe22d7eadca9cbdb27358

    SHA1

    971e02d83efe0035be1a7ef211a9bdf07f9f4980

    SHA256

    17a087192d4cb77fdfb74b25115e7c362ae4887d43e6f4520a2adfee0273cf14

    SHA512

    31796da96d1532ea5fc08599061c4dd5f2ff32b82d7f459f056341ed38dc41cc9d055ac3e225645052d38536b499d41cbe6563be3ff0fd0ea297ea56b9758495

  • C:\Users\Admin\AppData\Local\Temp\hummy.exe

    Filesize

    48KB

    MD5

    a7da8800511fe22d7eadca9cbdb27358

    SHA1

    971e02d83efe0035be1a7ef211a9bdf07f9f4980

    SHA256

    17a087192d4cb77fdfb74b25115e7c362ae4887d43e6f4520a2adfee0273cf14

    SHA512

    31796da96d1532ea5fc08599061c4dd5f2ff32b82d7f459f056341ed38dc41cc9d055ac3e225645052d38536b499d41cbe6563be3ff0fd0ea297ea56b9758495

  • \Users\Admin\AppData\Local\Temp\hummy.exe

    Filesize

    48KB

    MD5

    a7da8800511fe22d7eadca9cbdb27358

    SHA1

    971e02d83efe0035be1a7ef211a9bdf07f9f4980

    SHA256

    17a087192d4cb77fdfb74b25115e7c362ae4887d43e6f4520a2adfee0273cf14

    SHA512

    31796da96d1532ea5fc08599061c4dd5f2ff32b82d7f459f056341ed38dc41cc9d055ac3e225645052d38536b499d41cbe6563be3ff0fd0ea297ea56b9758495

  • \Users\Admin\AppData\Local\Temp\hummy.exe

    Filesize

    48KB

    MD5

    a7da8800511fe22d7eadca9cbdb27358

    SHA1

    971e02d83efe0035be1a7ef211a9bdf07f9f4980

    SHA256

    17a087192d4cb77fdfb74b25115e7c362ae4887d43e6f4520a2adfee0273cf14

    SHA512

    31796da96d1532ea5fc08599061c4dd5f2ff32b82d7f459f056341ed38dc41cc9d055ac3e225645052d38536b499d41cbe6563be3ff0fd0ea297ea56b9758495