Analysis
-
max time kernel
34s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 21:34
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.de4b5e928199a90a4cc7841a32cedf20.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.de4b5e928199a90a4cc7841a32cedf20.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.de4b5e928199a90a4cc7841a32cedf20.exe
-
Size
1.0MB
-
MD5
de4b5e928199a90a4cc7841a32cedf20
-
SHA1
51160f108654c6152e55a67f9a5645dbc980ca62
-
SHA256
fbddd51d75d70347930479905ca89bbf96c21780a1d38b4971ed67a685625eb4
-
SHA512
fdaf303a73435de0e8728fad72242d9a31ed6d3a4a76943f571966c1bca9768cfbbb608f14ddcdb2cdc117fcdde47d86e875c213950fe56c847342528fc47a7a
-
SSDEEP
24576:phJ6nTOYKu3LutmkEz+PAVV/OOInO4Xs2ztR4iegxLHgZpJE4VDd+L:p2nTOYKubutmkO+wAOInO4XrztygxLHj
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3292 MSWDM.EXE 2812 MSWDM.EXE 2824 NEAS.DE4B5E928199A90A4CC7841A32CEDF20.EXE 1764 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" NEAS.de4b5e928199a90a4cc7841a32cedf20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" NEAS.de4b5e928199a90a4cc7841a32cedf20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE NEAS.de4b5e928199a90a4cc7841a32cedf20.exe File opened for modification C:\Windows\devBB9F.tmp NEAS.de4b5e928199a90a4cc7841a32cedf20.exe File opened for modification C:\Windows\devBB9F.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2812 MSWDM.EXE 2812 MSWDM.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2672 wrote to memory of 3292 2672 NEAS.de4b5e928199a90a4cc7841a32cedf20.exe 87 PID 2672 wrote to memory of 3292 2672 NEAS.de4b5e928199a90a4cc7841a32cedf20.exe 87 PID 2672 wrote to memory of 3292 2672 NEAS.de4b5e928199a90a4cc7841a32cedf20.exe 87 PID 2672 wrote to memory of 2812 2672 NEAS.de4b5e928199a90a4cc7841a32cedf20.exe 88 PID 2672 wrote to memory of 2812 2672 NEAS.de4b5e928199a90a4cc7841a32cedf20.exe 88 PID 2672 wrote to memory of 2812 2672 NEAS.de4b5e928199a90a4cc7841a32cedf20.exe 88 PID 2812 wrote to memory of 2824 2812 MSWDM.EXE 89 PID 2812 wrote to memory of 2824 2812 MSWDM.EXE 89 PID 2812 wrote to memory of 2824 2812 MSWDM.EXE 89 PID 2812 wrote to memory of 1764 2812 MSWDM.EXE 91 PID 2812 wrote to memory of 1764 2812 MSWDM.EXE 91 PID 2812 wrote to memory of 1764 2812 MSWDM.EXE 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.de4b5e928199a90a4cc7841a32cedf20.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.de4b5e928199a90a4cc7841a32cedf20.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3292
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\devBB9F.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.de4b5e928199a90a4cc7841a32cedf20.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\NEAS.DE4B5E928199A90A4CC7841A32CEDF20.EXE
- Executes dropped EXE
PID:2824
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\devBB9F.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.DE4B5E928199A90A4CC7841A32CEDF20.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1764
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5beec185476f0c234229cc97f0bc6259c
SHA12f1c11dfdac947ece29d8e4558158926a0237c63
SHA2567228b6a716d5524920de6f44c8ea81e3d144396252cc618640a2b476d24374a8
SHA5128b6da10927e3770415068475431b2c3580e83242f5ed34cf4f002e2b09a15cd304d0ce64d02e9dc8158432673c5054e9f5fb3efe5bda4ddb4f810f8b942789dd
-
Filesize
1.0MB
MD5beec185476f0c234229cc97f0bc6259c
SHA12f1c11dfdac947ece29d8e4558158926a0237c63
SHA2567228b6a716d5524920de6f44c8ea81e3d144396252cc618640a2b476d24374a8
SHA5128b6da10927e3770415068475431b2c3580e83242f5ed34cf4f002e2b09a15cd304d0ce64d02e9dc8158432673c5054e9f5fb3efe5bda4ddb4f810f8b942789dd
-
Filesize
794KB
MD5c6d0721e9156eb2a40a04bb38be0b2a5
SHA1d0a3fcb3ad9f227a02d30abb767883b42fecc3a7
SHA2562435e1e50c097608e6157efb1036946cfdd02d86728e8e00a02b207bee36e60d
SHA512e254db10a7cffc4fe8c2d126dc4eb5029a84b2a931a67ad9ebfd04a8f3417e42a7dfb2e76d8911b2540bcf9eff9cbf92708b158dd8f53dbcbe7be51682ac3ad4
-
Filesize
1.0MB
MD5beec185476f0c234229cc97f0bc6259c
SHA12f1c11dfdac947ece29d8e4558158926a0237c63
SHA2567228b6a716d5524920de6f44c8ea81e3d144396252cc618640a2b476d24374a8
SHA5128b6da10927e3770415068475431b2c3580e83242f5ed34cf4f002e2b09a15cd304d0ce64d02e9dc8158432673c5054e9f5fb3efe5bda4ddb4f810f8b942789dd
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
794KB
MD5c6d0721e9156eb2a40a04bb38be0b2a5
SHA1d0a3fcb3ad9f227a02d30abb767883b42fecc3a7
SHA2562435e1e50c097608e6157efb1036946cfdd02d86728e8e00a02b207bee36e60d
SHA512e254db10a7cffc4fe8c2d126dc4eb5029a84b2a931a67ad9ebfd04a8f3417e42a7dfb2e76d8911b2540bcf9eff9cbf92708b158dd8f53dbcbe7be51682ac3ad4