Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14-10-2023 17:48
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.25363dc16a3758827dfb410343cdbcd0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.25363dc16a3758827dfb410343cdbcd0.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.25363dc16a3758827dfb410343cdbcd0.exe
-
Size
33KB
-
MD5
25363dc16a3758827dfb410343cdbcd0
-
SHA1
0e6b6e3537eefe353927521912d09a5f4b3150b1
-
SHA256
6066dde245686a939ae57d21a97ae35f104560eb5139024e8b929eedc4fedb0c
-
SHA512
20350c2b31388b1e1012caac85f726cc1452e1381e8a4c233bd4c3d931b73ef7ab5e3735dc206815e93223c668ecc190bc99baa25528d52b82c7cdd9dd2fbe58
-
SSDEEP
768:b/zG9lCapIyMdnfj5PseRQW63GNSI/DWua:ba9lDpInGAWUSMy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1716 hots.exe -
Loads dropped DLL 2 IoCs
pid Process 3024 NEAS.25363dc16a3758827dfb410343cdbcd0.exe 3024 NEAS.25363dc16a3758827dfb410343cdbcd0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3024 NEAS.25363dc16a3758827dfb410343cdbcd0.exe 1716 hots.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 1716 3024 NEAS.25363dc16a3758827dfb410343cdbcd0.exe 28 PID 3024 wrote to memory of 1716 3024 NEAS.25363dc16a3758827dfb410343cdbcd0.exe 28 PID 3024 wrote to memory of 1716 3024 NEAS.25363dc16a3758827dfb410343cdbcd0.exe 28 PID 3024 wrote to memory of 1716 3024 NEAS.25363dc16a3758827dfb410343cdbcd0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.25363dc16a3758827dfb410343cdbcd0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.25363dc16a3758827dfb410343cdbcd0.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\hots.exe"C:\Users\Admin\AppData\Local\Temp\hots.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5ba737dbd6e4978168a902f1442da7dde
SHA10862cd0259d97a7fb7617a3492492d444347a18b
SHA2566e5e93b13a2af9bdd4c7aabc00b97492578ce72503c5490439f138f85da00088
SHA5129a7509c5da07a6308693e7f9b80c20939895d1847e11b658c931fb9f9f58b5a25b02430b100945f4819c971196310d3b570638d3a3174001bcac3a0b93b7f845
-
Filesize
33KB
MD5ba737dbd6e4978168a902f1442da7dde
SHA10862cd0259d97a7fb7617a3492492d444347a18b
SHA2566e5e93b13a2af9bdd4c7aabc00b97492578ce72503c5490439f138f85da00088
SHA5129a7509c5da07a6308693e7f9b80c20939895d1847e11b658c931fb9f9f58b5a25b02430b100945f4819c971196310d3b570638d3a3174001bcac3a0b93b7f845
-
Filesize
33KB
MD5ba737dbd6e4978168a902f1442da7dde
SHA10862cd0259d97a7fb7617a3492492d444347a18b
SHA2566e5e93b13a2af9bdd4c7aabc00b97492578ce72503c5490439f138f85da00088
SHA5129a7509c5da07a6308693e7f9b80c20939895d1847e11b658c931fb9f9f58b5a25b02430b100945f4819c971196310d3b570638d3a3174001bcac3a0b93b7f845
-
Filesize
33KB
MD5ba737dbd6e4978168a902f1442da7dde
SHA10862cd0259d97a7fb7617a3492492d444347a18b
SHA2566e5e93b13a2af9bdd4c7aabc00b97492578ce72503c5490439f138f85da00088
SHA5129a7509c5da07a6308693e7f9b80c20939895d1847e11b658c931fb9f9f58b5a25b02430b100945f4819c971196310d3b570638d3a3174001bcac3a0b93b7f845
-
Filesize
33KB
MD5ba737dbd6e4978168a902f1442da7dde
SHA10862cd0259d97a7fb7617a3492492d444347a18b
SHA2566e5e93b13a2af9bdd4c7aabc00b97492578ce72503c5490439f138f85da00088
SHA5129a7509c5da07a6308693e7f9b80c20939895d1847e11b658c931fb9f9f58b5a25b02430b100945f4819c971196310d3b570638d3a3174001bcac3a0b93b7f845