Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/10/2023, 18:16

General

  • Target

    NEAS.307154cceaf38d121db49d15442fa480.exe

  • Size

    214KB

  • MD5

    307154cceaf38d121db49d15442fa480

  • SHA1

    375e4adb4450076825a91953c54640d4d42571b5

  • SHA256

    3704f8a2de26e69fbf8e05501422748c7a6013aad4c0c3a60acd8c8d8b2a6480

  • SHA512

    d185b780eb123326d6158d051e6040cfa24e6479793f48a241bf3019297082acc86abee80d949cf2346fbcbdbe529ccb9d52842efbdcbcf26d4b8bf2a70c78ef

  • SSDEEP

    3072:n/Fkx6xV5JJdRDl/2mmLWSYZ/h+E+BW9tNQlIRCsCmaQ0z8wHX75iKWwgkqBky:/F5VSI7+E+89H4IRnB0zJi1/t

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Drops file in Windows directory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.307154cceaf38d121db49d15442fa480.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.307154cceaf38d121db49d15442fa480.exe"
    1⤵
    • Drops file in Windows directory
    PID:2488

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\win32dc\FlatOut nocd.exe

          Filesize

          218KB

          MD5

          9f4183cfa132bf3d257a969a5b965ee7

          SHA1

          7c0db895f881cfc80175eb5ef4aa2e3c46e97dc2

          SHA256

          0c8acbc6641f479f6f114fbf76eadcd40f678137d9a43f105dca30d1f8bc31d3

          SHA512

          cc74cb133053558c39db36606cbd4ce0437ccc3838abfa7359c6519b2d31bf3468e8f68e7d2df2269cf52ca82d238cde6f795ecfe5b7721804a45ae90f77a628

        • memory/2488-25-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2488-27-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2488-20-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2488-21-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2488-22-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2488-23-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2488-24-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2488-0-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2488-1-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2488-28-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2488-26-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2488-29-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2488-30-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2488-31-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2488-32-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2488-33-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2488-34-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB