Analysis

  • max time kernel
    158s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2023, 17:56

General

  • Target

    NEAS.60e902ea036ea4101f7bf7c6a8296210.exe

  • Size

    127KB

  • MD5

    60e902ea036ea4101f7bf7c6a8296210

  • SHA1

    68c6f5575d01abb4d9186c1335e1b0290376f402

  • SHA256

    07e1b6a1a11928cfa3fab6f16c1ecf28556517930afd760e745aee6facb22da0

  • SHA512

    5680c90835c235558ecc453c46dd1858cfe7e402037cfdc0acce8912ff4501652ceebb8cc0f95020fa7b09572483cafb1192cfbc0a121e958df8456f0983bd37

  • SSDEEP

    1536:l6u6YB56XJ6owvzbNfURp4VntUhtH7Vi4BhRMq+xN:l6uB28owvlrVnihVVi4HaN

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.60e902ea036ea4101f7bf7c6a8296210.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.60e902ea036ea4101f7bf7c6a8296210.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • NTFS ADS
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Users\Admin\AppData\Local\Temp\NEAS.60e902ea036ea4101f7bf7c6a8296210.exe
      "C:\Users\Admin\AppData\Local\Temp\NEAS.60e902ea036ea4101f7bf7c6a8296210.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2080
      • C:\Windows\syswow64\svchost.exe
        C:\Windows\syswow64\svchost.exe
        3⤵
        • Adds policy Run key to start application
        • Drops file in Program Files directory
        PID:1064

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\NEAS.60e902ea036ea4101f7bf7c6a8296210.exe

          Filesize

          127KB

          MD5

          60e902ea036ea4101f7bf7c6a8296210

          SHA1

          68c6f5575d01abb4d9186c1335e1b0290376f402

          SHA256

          07e1b6a1a11928cfa3fab6f16c1ecf28556517930afd760e745aee6facb22da0

          SHA512

          5680c90835c235558ecc453c46dd1858cfe7e402037cfdc0acce8912ff4501652ceebb8cc0f95020fa7b09572483cafb1192cfbc0a121e958df8456f0983bd37

        • \Users\Admin\AppData\Local\Temp\NEAS.60e902ea036ea4101f7bf7c6a8296210.exe

          Filesize

          127KB

          MD5

          60e902ea036ea4101f7bf7c6a8296210

          SHA1

          68c6f5575d01abb4d9186c1335e1b0290376f402

          SHA256

          07e1b6a1a11928cfa3fab6f16c1ecf28556517930afd760e745aee6facb22da0

          SHA512

          5680c90835c235558ecc453c46dd1858cfe7e402037cfdc0acce8912ff4501652ceebb8cc0f95020fa7b09572483cafb1192cfbc0a121e958df8456f0983bd37

        • memory/1064-12-0x0000000000D90000-0x0000000000D98000-memory.dmp

          Filesize

          32KB

        • memory/1064-14-0x0000000000D90000-0x0000000000D98000-memory.dmp

          Filesize

          32KB

        • memory/1064-15-0x0000000000020000-0x0000000000025000-memory.dmp

          Filesize

          20KB

        • memory/1064-17-0x0000000000020000-0x0000000000025000-memory.dmp

          Filesize

          20KB

        • memory/1064-21-0x0000000000020000-0x0000000000025000-memory.dmp

          Filesize

          20KB

        • memory/2080-1-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/2080-3-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/2080-7-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/2080-10-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/2080-5-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB