Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 19:35
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f49f6bd73b2ca454f8801a822d7903b0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.f49f6bd73b2ca454f8801a822d7903b0.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.f49f6bd73b2ca454f8801a822d7903b0.exe
-
Size
29KB
-
MD5
f49f6bd73b2ca454f8801a822d7903b0
-
SHA1
09d13862e1e74e9d68bcb2cb1add3fc44e6092fb
-
SHA256
e224b969ed43bd211f56052f3ab1e73bd1dcb403b60f45ba7cee5a208e6ceaa4
-
SHA512
9ff641724ed6402ba86fa23a7f8f9f1ca2ced9a37c913407f1b4604b2433d57708183779e6f016d24affcad8988bd11ecd2d70712cd66d421c94ab4a4d026fa8
-
SSDEEP
384:qfRJYAySsaRbAEJb/0rZRwZBgs3CVyu850fEvkjzJYFedvKUm4U2JgEVSZTS0p9K:qfRygBbJj0dRwzgvysfjEe4VmGTNpk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2460 budha.exe -
Loads dropped DLL 1 IoCs
pid Process 2204 NEAS.f49f6bd73b2ca454f8801a822d7903b0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2460 2204 NEAS.f49f6bd73b2ca454f8801a822d7903b0.exe 28 PID 2204 wrote to memory of 2460 2204 NEAS.f49f6bd73b2ca454f8801a822d7903b0.exe 28 PID 2204 wrote to memory of 2460 2204 NEAS.f49f6bd73b2ca454f8801a822d7903b0.exe 28 PID 2204 wrote to memory of 2460 2204 NEAS.f49f6bd73b2ca454f8801a822d7903b0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f49f6bd73b2ca454f8801a822d7903b0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f49f6bd73b2ca454f8801a822d7903b0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD572b6403c7fca1633ed3501cfd2a1893a
SHA122b2a4b0a6da8f7a3d9f0583468c8836daa7ce6d
SHA2568be039a8d7b702e1c6132da6cc32e1a11c1d7da5d5a7a4249e58efbb5a1ffb14
SHA512402a8fe73c9b141876ba734e2a113ef1c7ddce789f860f3d5b6150ce5a36b01a4d3c005f987dc1c94960859a23e4925c965800182009687e348e5f6c25fb2379
-
Filesize
29KB
MD572b6403c7fca1633ed3501cfd2a1893a
SHA122b2a4b0a6da8f7a3d9f0583468c8836daa7ce6d
SHA2568be039a8d7b702e1c6132da6cc32e1a11c1d7da5d5a7a4249e58efbb5a1ffb14
SHA512402a8fe73c9b141876ba734e2a113ef1c7ddce789f860f3d5b6150ce5a36b01a4d3c005f987dc1c94960859a23e4925c965800182009687e348e5f6c25fb2379
-
Filesize
29KB
MD572b6403c7fca1633ed3501cfd2a1893a
SHA122b2a4b0a6da8f7a3d9f0583468c8836daa7ce6d
SHA2568be039a8d7b702e1c6132da6cc32e1a11c1d7da5d5a7a4249e58efbb5a1ffb14
SHA512402a8fe73c9b141876ba734e2a113ef1c7ddce789f860f3d5b6150ce5a36b01a4d3c005f987dc1c94960859a23e4925c965800182009687e348e5f6c25fb2379