Analysis
-
max time kernel
167s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 19:14
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.cf1e8a4cd8035a4d6949f82252663180.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.cf1e8a4cd8035a4d6949f82252663180.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.cf1e8a4cd8035a4d6949f82252663180.exe
-
Size
3.4MB
-
MD5
cf1e8a4cd8035a4d6949f82252663180
-
SHA1
6c6499c6eb2f6e1c1b6b86ca37de5639a224950d
-
SHA256
a214955b1498dd263c821fe96a80855a6d9d79052da87c3e77699bfad8c5ff55
-
SHA512
c40ced0f9ed98b16b87e8a1741a206d37329e11b35191e7e6c99c54c37ee536350eca15cfa6a9903c92d89a4d2783af127d11539f6f824e0515e208563a9f0f4
-
SSDEEP
49152:lE4A44iOSUYL6YgnRGqvzgzqpWDlGLkee59GN6LX+TKhNFZ07rLdedhl/lzpuipl:rxee5gN6LX+TKhnEEdhJRpf0suk3
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4084 NEAS.cf1e8a4cd8035a4d6949f82252663180.exe Token: SeRestorePrivilege 4016 dw20.exe Token: SeBackupPrivilege 4016 dw20.exe Token: SeBackupPrivilege 4016 dw20.exe Token: SeBackupPrivilege 4016 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4084 wrote to memory of 4016 4084 NEAS.cf1e8a4cd8035a4d6949f82252663180.exe 84 PID 4084 wrote to memory of 4016 4084 NEAS.cf1e8a4cd8035a4d6949f82252663180.exe 84 PID 4084 wrote to memory of 4016 4084 NEAS.cf1e8a4cd8035a4d6949f82252663180.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.cf1e8a4cd8035a4d6949f82252663180.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.cf1e8a4cd8035a4d6949f82252663180.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 9722⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4016
-