Analysis
-
max time kernel
152s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 17:49
Behavioral task
behavioral1
Sample
NEAS.2f7f0d31bb8e6db98918c6f73e39cea0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.2f7f0d31bb8e6db98918c6f73e39cea0.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.2f7f0d31bb8e6db98918c6f73e39cea0.exe
-
Size
88KB
-
MD5
2f7f0d31bb8e6db98918c6f73e39cea0
-
SHA1
7533be126079232de6e95bc62bb2af8eb9438107
-
SHA256
04d6ebcf62618db04393ecdb3a872034a6e7ca8d0efa5f9f1e02a1ed17e805d3
-
SHA512
8a7bcd4ed1290aa04a19f53ce1d81f1cf032673bdb5971e68cb24cecee6635347dff1ea55cd2aa4140747811d476a2b7282fbff0c5c31f57dc62412cfddfa0e8
-
SSDEEP
1536:UKiJCGGi39mF3OpIfEabJdvOW8h+ZrNr8lvuvmqd4FOejogFPGa/ip5yp:UKHi39E5Eash2mlhBOejooPGa/ocp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4228 prints.exe -
Loads dropped DLL 2 IoCs
pid Process 4228 prints.exe 4228 prints.exe -
resource yara_rule behavioral2/memory/2840-0-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/files/0x0006000000023220-12.dat upx behavioral2/files/0x0006000000023220-13.dat upx behavioral2/memory/2840-15-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/4228-20-0x0000000000400000-0x0000000000434000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinSysQQ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\prints.exe" prints.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe 4228 prints.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2840 wrote to memory of 4228 2840 NEAS.2f7f0d31bb8e6db98918c6f73e39cea0.exe 86 PID 2840 wrote to memory of 4228 2840 NEAS.2f7f0d31bb8e6db98918c6f73e39cea0.exe 86 PID 2840 wrote to memory of 4228 2840 NEAS.2f7f0d31bb8e6db98918c6f73e39cea0.exe 86 PID 2840 wrote to memory of 856 2840 NEAS.2f7f0d31bb8e6db98918c6f73e39cea0.exe 87 PID 2840 wrote to memory of 856 2840 NEAS.2f7f0d31bb8e6db98918c6f73e39cea0.exe 87 PID 2840 wrote to memory of 856 2840 NEAS.2f7f0d31bb8e6db98918c6f73e39cea0.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2f7f0d31bb8e6db98918c6f73e39cea0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2f7f0d31bb8e6db98918c6f73e39cea0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\prints.exeC:\Users\Admin\AppData\Local\Temp\prints.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4228
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\Deleteme.bat2⤵PID:856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
194B
MD52e9399159e309c60e501321bbb6329f8
SHA1be20123e886592d58b56e4c95694542a4c392584
SHA256e7669ee66bc47e0704cce20d3209b830783ae57da4d2c2bd9bdac85901061ad8
SHA512713b4c12f158afe3c17e2183371eaa96aec941028ce4bde5540ae8221150712309048ae6e8195bc5dc97888342b34f2ed369a489d02384a16c2154298251bb7d
-
Filesize
100KB
MD52a65cea9b055ce4ed42edbd4e356a1d4
SHA150be987e1b846385c00ae77dc6f8a1b30070fa50
SHA2563e8eb17dd4f927991307eeecfcd01c2fb16383c25e282b0e39faf4f2460d4503
SHA512e73578073bcaff87927aa0c20bf062c3afa20a70488934b3945b8b80d50cfba34e486d5e9cee92acd7c66d86aa123a0489e1bba22815b8ecdd1250a1bd5b6682
-
Filesize
100KB
MD52a65cea9b055ce4ed42edbd4e356a1d4
SHA150be987e1b846385c00ae77dc6f8a1b30070fa50
SHA2563e8eb17dd4f927991307eeecfcd01c2fb16383c25e282b0e39faf4f2460d4503
SHA512e73578073bcaff87927aa0c20bf062c3afa20a70488934b3945b8b80d50cfba34e486d5e9cee92acd7c66d86aa123a0489e1bba22815b8ecdd1250a1bd5b6682
-
Filesize
100KB
MD52a65cea9b055ce4ed42edbd4e356a1d4
SHA150be987e1b846385c00ae77dc6f8a1b30070fa50
SHA2563e8eb17dd4f927991307eeecfcd01c2fb16383c25e282b0e39faf4f2460d4503
SHA512e73578073bcaff87927aa0c20bf062c3afa20a70488934b3945b8b80d50cfba34e486d5e9cee92acd7c66d86aa123a0489e1bba22815b8ecdd1250a1bd5b6682
-
Filesize
88KB
MD52f7f0d31bb8e6db98918c6f73e39cea0
SHA17533be126079232de6e95bc62bb2af8eb9438107
SHA25604d6ebcf62618db04393ecdb3a872034a6e7ca8d0efa5f9f1e02a1ed17e805d3
SHA5128a7bcd4ed1290aa04a19f53ce1d81f1cf032673bdb5971e68cb24cecee6635347dff1ea55cd2aa4140747811d476a2b7282fbff0c5c31f57dc62412cfddfa0e8
-
Filesize
88KB
MD52f7f0d31bb8e6db98918c6f73e39cea0
SHA17533be126079232de6e95bc62bb2af8eb9438107
SHA25604d6ebcf62618db04393ecdb3a872034a6e7ca8d0efa5f9f1e02a1ed17e805d3
SHA5128a7bcd4ed1290aa04a19f53ce1d81f1cf032673bdb5971e68cb24cecee6635347dff1ea55cd2aa4140747811d476a2b7282fbff0c5c31f57dc62412cfddfa0e8