Analysis
-
max time kernel
177s -
max time network
203s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.5b8da1a8856af709276f4310ecf226d0.exe
Resource
win7-20230831-en
General
-
Target
NEAS.5b8da1a8856af709276f4310ecf226d0.exe
-
Size
614KB
-
MD5
5b8da1a8856af709276f4310ecf226d0
-
SHA1
793c97a43970b2be2bd350a46b4a28eabe494af1
-
SHA256
310bedbba09566b7c6cbbcd945173229ace30d35c27289f7b12c6f1d64f8e2e4
-
SHA512
e114d2854fb73e66e8d8d9a60b484e10edd4e8ec486d70e371fb9607cec6d315dfa841a153092a19a9e115edc043ae478c9679d03124419d38fa7f7c21a49539
-
SSDEEP
12288:rXuG1T0elw03WKwJs8yv0PtZn7gTSWTpQzMeqvmrexkknxQzBIp:rXu2nlw6WJyyRKTZuSxlx8
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 468 Process not Found 2728 alg.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe NEAS.5b8da1a8856af709276f4310ecf226d0.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\b4f317fb204f420c.bin alg.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe NEAS.5b8da1a8856af709276f4310ecf226d0.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2828 2696 WerFault.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2696 NEAS.5b8da1a8856af709276f4310ecf226d0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2828 2696 NEAS.5b8da1a8856af709276f4310ecf226d0.exe 29 PID 2696 wrote to memory of 2828 2696 NEAS.5b8da1a8856af709276f4310ecf226d0.exe 29 PID 2696 wrote to memory of 2828 2696 NEAS.5b8da1a8856af709276f4310ecf226d0.exe 29 PID 2696 wrote to memory of 2828 2696 NEAS.5b8da1a8856af709276f4310ecf226d0.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5b8da1a8856af709276f4310ecf226d0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5b8da1a8856af709276f4310ecf226d0.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 3042⤵
- Program crash
PID:2828
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2728
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
644KB
MD5f624d77b9aaf8e0e946962da84d8ff38
SHA10bf7539ba1aac577dd5002f90b1cbb96f8adfe3b
SHA2566d08bc1edb52159ac24e9a273444767206cf19eead11b95bb8a3273a48be7c92
SHA51267768d9b2a085be8c76634b5c1dabb54c27063da592ba4c416930695e594a2c263b421bf7f1898f6e1f39c54b7b50041b7610d788d9204f4edaca28527585c9c
-
Filesize
644KB
MD5f624d77b9aaf8e0e946962da84d8ff38
SHA10bf7539ba1aac577dd5002f90b1cbb96f8adfe3b
SHA2566d08bc1edb52159ac24e9a273444767206cf19eead11b95bb8a3273a48be7c92
SHA51267768d9b2a085be8c76634b5c1dabb54c27063da592ba4c416930695e594a2c263b421bf7f1898f6e1f39c54b7b50041b7610d788d9204f4edaca28527585c9c