Analysis

  • max time kernel
    164s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-10-2023 17:59

General

  • Target

    NEAS.766dd94a9cc5996d26e95876f8f58100.exe

  • Size

    456KB

  • MD5

    766dd94a9cc5996d26e95876f8f58100

  • SHA1

    2352c01b1aaecb5983b178437a828e1fa4b52f1b

  • SHA256

    7f5958ba4e2e557c2f884bbdffcc809eeb695c351f51519eb16dd8d38067afa7

  • SHA512

    05c51de2b9eb98b1815cd8715e8d7a6e7abd281e849c20146c0efb958260b6f728812a6069cd89be282575908acdfd9740c1aa1cf585cec90b08129b8ce65990

  • SSDEEP

    6144:GpAaHn9qqNebqwqruKVph0Zsh8uc6+PpmTFfNJMcwRcaIxiXKWfN1diQlHEWHi09:mdZkqhrueWsh1TZ4b/g6kyQ2

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.766dd94a9cc5996d26e95876f8f58100.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.766dd94a9cc5996d26e95876f8f58100.exe"
    1⤵
    • Drops startup file
    PID:4716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4716-0-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB

  • memory/4716-1-0x0000000000190000-0x0000000000192000-memory.dmp

    Filesize

    8KB

  • memory/4716-2-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/4716-3-0x0000000000910000-0x0000000000911000-memory.dmp

    Filesize

    4KB

  • memory/4716-4-0x0000000000940000-0x0000000000941000-memory.dmp

    Filesize

    4KB

  • memory/4716-6-0x0000000000970000-0x0000000000971000-memory.dmp

    Filesize

    4KB

  • memory/4716-5-0x0000000000960000-0x0000000000961000-memory.dmp

    Filesize

    4KB

  • memory/4716-7-0x0000000000A60000-0x0000000000A8C000-memory.dmp

    Filesize

    176KB

  • memory/4716-11-0x00000000009F0000-0x00000000009F1000-memory.dmp

    Filesize

    4KB

  • memory/4716-8-0x0000000000980000-0x0000000000981000-memory.dmp

    Filesize

    4KB

  • memory/4716-12-0x0000000000A00000-0x0000000000A01000-memory.dmp

    Filesize

    4KB

  • memory/4716-14-0x0000000000A10000-0x0000000000A11000-memory.dmp

    Filesize

    4KB

  • memory/4716-15-0x0000000000A20000-0x0000000000A21000-memory.dmp

    Filesize

    4KB

  • memory/4716-16-0x0000000000A30000-0x0000000000A31000-memory.dmp

    Filesize

    4KB

  • memory/4716-17-0x0000000000A40000-0x0000000000A41000-memory.dmp

    Filesize

    4KB

  • memory/4716-18-0x0000000000A50000-0x0000000000A51000-memory.dmp

    Filesize

    4KB

  • memory/4716-20-0x0000000002F80000-0x0000000002F81000-memory.dmp

    Filesize

    4KB

  • memory/4716-19-0x0000000000A90000-0x0000000000A91000-memory.dmp

    Filesize

    4KB

  • memory/4716-21-0x0000000002F70000-0x0000000002F71000-memory.dmp

    Filesize

    4KB

  • memory/4716-22-0x0000000002F90000-0x0000000002F91000-memory.dmp

    Filesize

    4KB

  • memory/4716-23-0x0000000002FA0000-0x0000000002FA1000-memory.dmp

    Filesize

    4KB

  • memory/4716-24-0x0000000002FB0000-0x0000000002FB1000-memory.dmp

    Filesize

    4KB

  • memory/4716-25-0x0000000002FC0000-0x0000000002FC1000-memory.dmp

    Filesize

    4KB

  • memory/4716-26-0x0000000002FE0000-0x0000000002FE1000-memory.dmp

    Filesize

    4KB

  • memory/4716-30-0x00000000009E0000-0x00000000009E1000-memory.dmp

    Filesize

    4KB

  • memory/4716-31-0x00000000009D0000-0x00000000009D2000-memory.dmp

    Filesize

    8KB

  • memory/4716-32-0x0000000002F60000-0x0000000002F61000-memory.dmp

    Filesize

    4KB

  • memory/4716-33-0x0000000002FD0000-0x0000000002FD1000-memory.dmp

    Filesize

    4KB

  • memory/4716-34-0x0000000003330000-0x0000000003331000-memory.dmp

    Filesize

    4KB

  • memory/4716-38-0x0000000002DF0000-0x0000000002DF1000-memory.dmp

    Filesize

    4KB