Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 18:05
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.9071a01155bf156a20b06da1f4806680.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.9071a01155bf156a20b06da1f4806680.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.9071a01155bf156a20b06da1f4806680.exe
-
Size
41KB
-
MD5
9071a01155bf156a20b06da1f4806680
-
SHA1
d6cdceff68f1dbb0db8ac907d7cc90faa93f7ba4
-
SHA256
ed6d37a1f9110dc638a32166ade72ec1ad516a4cceece7cfade77816502a760e
-
SHA512
eece8b6de25917c32b8b127204fa77a3ad9ee66778e16fd6b41eee1f3084dbd8d379059496258ef4b4db714754876d749c65b65523e69289f87b6dd4a33f1c06
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLaHaMMm2XM0:V6QFElP6n+gMQMOtEvwDpjyaHaXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3052 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2188 NEAS.9071a01155bf156a20b06da1f4806680.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 3052 2188 NEAS.9071a01155bf156a20b06da1f4806680.exe 28 PID 2188 wrote to memory of 3052 2188 NEAS.9071a01155bf156a20b06da1f4806680.exe 28 PID 2188 wrote to memory of 3052 2188 NEAS.9071a01155bf156a20b06da1f4806680.exe 28 PID 2188 wrote to memory of 3052 2188 NEAS.9071a01155bf156a20b06da1f4806680.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.9071a01155bf156a20b06da1f4806680.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.9071a01155bf156a20b06da1f4806680.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD50ccb8961ebb45e2766a8d22d162dc1e0
SHA113f6ccff9e222fdb441decc04a7b2a1a946067f3
SHA2566d54daa1fb07d22a635c5cbd8653e8a7769573515403dc1a849798339f0f11d6
SHA512145c9488123aa2aa65c72298338b2e3119259d6d1e633744157a2514b62b79bba5f37b111decfcb95266d17de603aa9a09249419f163f9860bfaf70a73fc25bf
-
Filesize
41KB
MD50ccb8961ebb45e2766a8d22d162dc1e0
SHA113f6ccff9e222fdb441decc04a7b2a1a946067f3
SHA2566d54daa1fb07d22a635c5cbd8653e8a7769573515403dc1a849798339f0f11d6
SHA512145c9488123aa2aa65c72298338b2e3119259d6d1e633744157a2514b62b79bba5f37b111decfcb95266d17de603aa9a09249419f163f9860bfaf70a73fc25bf
-
Filesize
41KB
MD50ccb8961ebb45e2766a8d22d162dc1e0
SHA113f6ccff9e222fdb441decc04a7b2a1a946067f3
SHA2566d54daa1fb07d22a635c5cbd8653e8a7769573515403dc1a849798339f0f11d6
SHA512145c9488123aa2aa65c72298338b2e3119259d6d1e633744157a2514b62b79bba5f37b111decfcb95266d17de603aa9a09249419f163f9860bfaf70a73fc25bf