Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    21-10-2023 21:29

General

  • Target

    NEAS.b8548acb164f64cbed50f3c7015b8730.exe

  • Size

    6.2MB

  • MD5

    b8548acb164f64cbed50f3c7015b8730

  • SHA1

    6966064d45e3638efa1f701b9ede7697cbcd7f6b

  • SHA256

    6d864883048349b5e53d96d0d9a063317709bc4e6fc99c90847646f8dd418bb3

  • SHA512

    84ff6059da9aef695d6069fb0ed65b8df4c916b3b15fdc7c6485ff1912b7f1a996e0ca4f627260c04bdc5c4ce8de17372e0d0275880f13d06eb80fc41f83cb49

  • SSDEEP

    196608:719yWJQch00gjwJI0Zwz8kl65dW6BrOyFi8Y:7uKh00CwJ3DXLOCtY

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.b8548acb164f64cbed50f3c7015b8730.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.b8548acb164f64cbed50f3c7015b8730.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:3004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCXA862.tmp

    Filesize

    62KB

    MD5

    c28efdd834ed453de90e550a8052f4b6

    SHA1

    1b4bd9e6b5254afdffa1d67e4f7f41fd320baee3

    SHA256

    ef1d62466f858e8f95d22c09679542c14ed2e711b64c7c75f5dd9edbd6da0ce3

    SHA512

    650ddc81119bf722a1af9ad01b5b76997b7cdcd075ea1a34f60ddc14902f1d0238eb8c272e83cefa2ee9f840097daedbe230049a1e7a7c1427ab9fcab30c1d47

  • C:\Windows\SysWOW64\xdccPrograms\7zG.exe

    Filesize

    6.3MB

    MD5

    b61f601a8955dd7318bb4028a68a466f

    SHA1

    8f836b7088785acecc164b67f9769b3f98034428

    SHA256

    7fb95fab463262846696b4d0025eb396e7cdd2fe8f573987df4019ae7302c068

    SHA512

    ae5f489fb6da9a36872cefee56ee271cb90a2c6335624551d630859c7e9f05022d091615e02de5117c5b51f8fac97819a49932117ad9a0bfb381fd2925398126

  • memory/3004-108-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3004-109-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3004-104-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3004-105-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3004-106-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3004-107-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3004-102-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3004-103-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3004-110-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3004-111-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3004-112-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3004-113-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3004-114-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3004-115-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB