Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    21/10/2023, 21:31

General

  • Target

    NEAS.c91bfcca887f762a751c6ff90506a9e0.exe

  • Size

    29KB

  • MD5

    c91bfcca887f762a751c6ff90506a9e0

  • SHA1

    fc5b2b39c7bda970e9f47ab38a47b88c4d69a037

  • SHA256

    f2a052d35ec9e89d4e1acf2398a3aac4af3fea7acb7bcd4d8dec651cda5b7af4

  • SHA512

    7b0e25f7d50f9c86b70deb7207c3a1221cba1edf76a113a77cd86769cc953cae2e368b32cd316311d7695c5cb92c38fee4f3dd0bcd71195840f15148197f18ba

  • SSDEEP

    384:GGjQXUe0JJLXu1KKUgGWAxpr6+A9PfnfLBrJ14TJzzoXZ9gbH:GGkkeKLXodUgGBxkj3DBrnEJz8pybH

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.c91bfcca887f762a751c6ff90506a9e0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.c91bfcca887f762a751c6ff90506a9e0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Users\Admin\AppData\Local\Temp\zbhnd.exe
      "C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"
      2⤵
      • Executes dropped EXE
      PID:2168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\zbhnd.exe

    Filesize

    30KB

    MD5

    90a3366401d7b21784760762300c12f7

    SHA1

    d42618952c97e43162984167bc8ad1e1d999a2c0

    SHA256

    ff3e4851e17d80269f839cf003d9a2f641aab5e412c5b652f0c7088f01f1fbba

    SHA512

    47c01a724370ae3e60c25aa7a50c43acb2201a6a539b23e56d143c5bb419c6a377ae0c309fa4e05439e856e2a9a528184ad81df211079edf261420143c6fa9c5

  • C:\Users\Admin\AppData\Local\Temp\zbhnd.exe

    Filesize

    30KB

    MD5

    90a3366401d7b21784760762300c12f7

    SHA1

    d42618952c97e43162984167bc8ad1e1d999a2c0

    SHA256

    ff3e4851e17d80269f839cf003d9a2f641aab5e412c5b652f0c7088f01f1fbba

    SHA512

    47c01a724370ae3e60c25aa7a50c43acb2201a6a539b23e56d143c5bb419c6a377ae0c309fa4e05439e856e2a9a528184ad81df211079edf261420143c6fa9c5

  • \Users\Admin\AppData\Local\Temp\zbhnd.exe

    Filesize

    30KB

    MD5

    90a3366401d7b21784760762300c12f7

    SHA1

    d42618952c97e43162984167bc8ad1e1d999a2c0

    SHA256

    ff3e4851e17d80269f839cf003d9a2f641aab5e412c5b652f0c7088f01f1fbba

    SHA512

    47c01a724370ae3e60c25aa7a50c43acb2201a6a539b23e56d143c5bb419c6a377ae0c309fa4e05439e856e2a9a528184ad81df211079edf261420143c6fa9c5

  • memory/2168-8-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2168-9-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/3020-0-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/3020-2-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB