Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
16/10/2023, 18:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.8fa0134ef4267a6b6a91d9f92090fbc0.exe
Resource
win7-20230831-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.8fa0134ef4267a6b6a91d9f92090fbc0.exe
Resource
win10v2004-20230915-en
4 signatures
150 seconds
General
-
Target
NEAS.8fa0134ef4267a6b6a91d9f92090fbc0.exe
-
Size
191KB
-
MD5
8fa0134ef4267a6b6a91d9f92090fbc0
-
SHA1
2bca82b4d47e3819840a85ab886b4955ceaeb0a8
-
SHA256
36bf1eca9d28e0a2a0a213586d7f2a524b13180885de607a21196f7961c70365
-
SHA512
7a08d30508f79b52a1b5a969b72486531a1451ea813985314086864ffd8cf345077ef7e416388c796dca6157f01f4fd1190d01e377f43389b3b22a96f169ee93
-
SSDEEP
3072:rEKWYMW11Y4b3e7un4VZvjv0UEaBADSoW94wkr6h:rEKWnWHUEaA+94H6
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 4792 dw20.exe Token: SeBackupPrivilege 4792 dw20.exe Token: SeBackupPrivilege 4792 dw20.exe Token: SeBackupPrivilege 4792 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1840 wrote to memory of 4792 1840 NEAS.8fa0134ef4267a6b6a91d9f92090fbc0.exe 84 PID 1840 wrote to memory of 4792 1840 NEAS.8fa0134ef4267a6b6a91d9f92090fbc0.exe 84 PID 1840 wrote to memory of 4792 1840 NEAS.8fa0134ef4267a6b6a91d9f92090fbc0.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.8fa0134ef4267a6b6a91d9f92090fbc0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.8fa0134ef4267a6b6a91d9f92090fbc0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 10002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4792
-