Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
21/10/2023, 21:32
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.ce8eac37a80a0ef29e5f1dfa58ba6d60.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.ce8eac37a80a0ef29e5f1dfa58ba6d60.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.ce8eac37a80a0ef29e5f1dfa58ba6d60.exe
-
Size
71KB
-
MD5
ce8eac37a80a0ef29e5f1dfa58ba6d60
-
SHA1
49acd4af6edc9fda9cef10fc1d0c4358b978bb3a
-
SHA256
fa884c3d8c88bda57208bc3f485b1a2526056319a665c4e6f16692b65b03f994
-
SHA512
df0dda25bf0fa300c1d036aab6039c088b287d7c03c53e6803c5b78cab43aaadad65fed10e80d9b85037d7e5033f7397ac9b6354d09b608a6a934ae477ef244e
-
SSDEEP
1536:1DCFitszeGOsk8sne5u3SRtLsUEu5bc3TfaCQ0wN2wut:1DCoszVO1n+cShrmpW0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2004 elevasg.exe -
Loads dropped DLL 1 IoCs
pid Process 1452 NEAS.ce8eac37a80a0ef29e5f1dfa58ba6d60.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 icanhazip.com -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1452 wrote to memory of 2004 1452 NEAS.ce8eac37a80a0ef29e5f1dfa58ba6d60.exe 28 PID 1452 wrote to memory of 2004 1452 NEAS.ce8eac37a80a0ef29e5f1dfa58ba6d60.exe 28 PID 1452 wrote to memory of 2004 1452 NEAS.ce8eac37a80a0ef29e5f1dfa58ba6d60.exe 28 PID 1452 wrote to memory of 2004 1452 NEAS.ce8eac37a80a0ef29e5f1dfa58ba6d60.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.ce8eac37a80a0ef29e5f1dfa58ba6d60.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.ce8eac37a80a0ef29e5f1dfa58ba6d60.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\elevasg.exeC:\Users\Admin\AppData\Local\Temp\elevasg.exe2⤵
- Executes dropped EXE
PID:2004
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD58ffe2f9f16da45900d016421c354bcad
SHA126081b94bd0faca5087aaae98c2ad1a51fd6b439
SHA256fc03455eedfad22c50c32c98beb84ca478ff86aa042df5b703240eec8eeb6f3c
SHA512a2026846b5d1efa40e5238ed4560446706a5efcccf0dc48949123612142279c47ff12c4a321f7f857d71a63452725c330009be66dd20c937112f4b2638da26e1
-
Filesize
72KB
MD58ffe2f9f16da45900d016421c354bcad
SHA126081b94bd0faca5087aaae98c2ad1a51fd6b439
SHA256fc03455eedfad22c50c32c98beb84ca478ff86aa042df5b703240eec8eeb6f3c
SHA512a2026846b5d1efa40e5238ed4560446706a5efcccf0dc48949123612142279c47ff12c4a321f7f857d71a63452725c330009be66dd20c937112f4b2638da26e1
-
Filesize
72KB
MD58ffe2f9f16da45900d016421c354bcad
SHA126081b94bd0faca5087aaae98c2ad1a51fd6b439
SHA256fc03455eedfad22c50c32c98beb84ca478ff86aa042df5b703240eec8eeb6f3c
SHA512a2026846b5d1efa40e5238ed4560446706a5efcccf0dc48949123612142279c47ff12c4a321f7f857d71a63452725c330009be66dd20c937112f4b2638da26e1