Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14-10-2023 08:23
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f7360409d0c58f335830de329debb1f0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.f7360409d0c58f335830de329debb1f0.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.f7360409d0c58f335830de329debb1f0.exe
-
Size
48KB
-
MD5
f7360409d0c58f335830de329debb1f0
-
SHA1
db093cd04d3f521a49d7b18211e8a4add3f338d9
-
SHA256
58520880af8d86a5c96c276b7365fe9ab1b1e03d6813200e4796fa4403fcc4ed
-
SHA512
6dbdff9bd073d523249819b9681b9bcd72b5f5e1c86e6d5a413527ff600fceab67c4ffac3c2a36494bae113c01390ded1aab75b0c5c829a6ca6fd588cfc0471c
-
SSDEEP
384:dw2nwR2Fbql2alyVzJshA4FNPxXUfgCsApV2WCMuWl84IqGXhh19:dwowR6XaUVlYNPxkfLsApVZRP+4xGXhZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2688 hummy.exe -
Loads dropped DLL 2 IoCs
pid Process 1928 NEAS.f7360409d0c58f335830de329debb1f0.exe 1928 NEAS.f7360409d0c58f335830de329debb1f0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2688 1928 NEAS.f7360409d0c58f335830de329debb1f0.exe 28 PID 1928 wrote to memory of 2688 1928 NEAS.f7360409d0c58f335830de329debb1f0.exe 28 PID 1928 wrote to memory of 2688 1928 NEAS.f7360409d0c58f335830de329debb1f0.exe 28 PID 1928 wrote to memory of 2688 1928 NEAS.f7360409d0c58f335830de329debb1f0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f7360409d0c58f335830de329debb1f0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f7360409d0c58f335830de329debb1f0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\hummy.exe"C:\Users\Admin\AppData\Local\Temp\hummy.exe"2⤵
- Executes dropped EXE
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5a7da8800511fe22d7eadca9cbdb27358
SHA1971e02d83efe0035be1a7ef211a9bdf07f9f4980
SHA25617a087192d4cb77fdfb74b25115e7c362ae4887d43e6f4520a2adfee0273cf14
SHA51231796da96d1532ea5fc08599061c4dd5f2ff32b82d7f459f056341ed38dc41cc9d055ac3e225645052d38536b499d41cbe6563be3ff0fd0ea297ea56b9758495
-
Filesize
48KB
MD5a7da8800511fe22d7eadca9cbdb27358
SHA1971e02d83efe0035be1a7ef211a9bdf07f9f4980
SHA25617a087192d4cb77fdfb74b25115e7c362ae4887d43e6f4520a2adfee0273cf14
SHA51231796da96d1532ea5fc08599061c4dd5f2ff32b82d7f459f056341ed38dc41cc9d055ac3e225645052d38536b499d41cbe6563be3ff0fd0ea297ea56b9758495
-
Filesize
48KB
MD5a7da8800511fe22d7eadca9cbdb27358
SHA1971e02d83efe0035be1a7ef211a9bdf07f9f4980
SHA25617a087192d4cb77fdfb74b25115e7c362ae4887d43e6f4520a2adfee0273cf14
SHA51231796da96d1532ea5fc08599061c4dd5f2ff32b82d7f459f056341ed38dc41cc9d055ac3e225645052d38536b499d41cbe6563be3ff0fd0ea297ea56b9758495
-
Filesize
48KB
MD5a7da8800511fe22d7eadca9cbdb27358
SHA1971e02d83efe0035be1a7ef211a9bdf07f9f4980
SHA25617a087192d4cb77fdfb74b25115e7c362ae4887d43e6f4520a2adfee0273cf14
SHA51231796da96d1532ea5fc08599061c4dd5f2ff32b82d7f459f056341ed38dc41cc9d055ac3e225645052d38536b499d41cbe6563be3ff0fd0ea297ea56b9758495
-
Filesize
48KB
MD5a7da8800511fe22d7eadca9cbdb27358
SHA1971e02d83efe0035be1a7ef211a9bdf07f9f4980
SHA25617a087192d4cb77fdfb74b25115e7c362ae4887d43e6f4520a2adfee0273cf14
SHA51231796da96d1532ea5fc08599061c4dd5f2ff32b82d7f459f056341ed38dc41cc9d055ac3e225645052d38536b499d41cbe6563be3ff0fd0ea297ea56b9758495