Analysis

  • max time kernel
    34s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/10/2023, 21:34

General

  • Target

    NEAS.de4b5e928199a90a4cc7841a32cedf20.exe

  • Size

    1.0MB

  • MD5

    de4b5e928199a90a4cc7841a32cedf20

  • SHA1

    51160f108654c6152e55a67f9a5645dbc980ca62

  • SHA256

    fbddd51d75d70347930479905ca89bbf96c21780a1d38b4971ed67a685625eb4

  • SHA512

    fdaf303a73435de0e8728fad72242d9a31ed6d3a4a76943f571966c1bca9768cfbbb608f14ddcdb2cdc117fcdde47d86e875c213950fe56c847342528fc47a7a

  • SSDEEP

    24576:phJ6nTOYKu3LutmkEz+PAVV/OOInO4Xs2ztR4iegxLHgZpJE4VDd+L:p2nTOYKubutmkO+wAOInO4XrztygxLHj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.de4b5e928199a90a4cc7841a32cedf20.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.de4b5e928199a90a4cc7841a32cedf20.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:3292
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\devBB9F.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.de4b5e928199a90a4cc7841a32cedf20.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2812
      • C:\Users\Admin\AppData\Local\Temp\NEAS.DE4B5E928199A90A4CC7841A32CEDF20.EXE
        3⤵
        • Executes dropped EXE
        PID:2824
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\devBB9F.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.DE4B5E928199A90A4CC7841A32CEDF20.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1764

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\NEAS.DE4B5E928199A90A4CC7841A32CEDF20.EXE

          Filesize

          1.0MB

          MD5

          beec185476f0c234229cc97f0bc6259c

          SHA1

          2f1c11dfdac947ece29d8e4558158926a0237c63

          SHA256

          7228b6a716d5524920de6f44c8ea81e3d144396252cc618640a2b476d24374a8

          SHA512

          8b6da10927e3770415068475431b2c3580e83242f5ed34cf4f002e2b09a15cd304d0ce64d02e9dc8158432673c5054e9f5fb3efe5bda4ddb4f810f8b942789dd

        • C:\Users\Admin\AppData\Local\Temp\NEAS.DE4B5E928199A90A4CC7841A32CEDF20.EXE

          Filesize

          1.0MB

          MD5

          beec185476f0c234229cc97f0bc6259c

          SHA1

          2f1c11dfdac947ece29d8e4558158926a0237c63

          SHA256

          7228b6a716d5524920de6f44c8ea81e3d144396252cc618640a2b476d24374a8

          SHA512

          8b6da10927e3770415068475431b2c3580e83242f5ed34cf4f002e2b09a15cd304d0ce64d02e9dc8158432673c5054e9f5fb3efe5bda4ddb4f810f8b942789dd

        • C:\Users\Admin\AppData\Local\Temp\NEAS.de4b5e928199a90a4cc7841a32cedf20.exe

          Filesize

          794KB

          MD5

          c6d0721e9156eb2a40a04bb38be0b2a5

          SHA1

          d0a3fcb3ad9f227a02d30abb767883b42fecc3a7

          SHA256

          2435e1e50c097608e6157efb1036946cfdd02d86728e8e00a02b207bee36e60d

          SHA512

          e254db10a7cffc4fe8c2d126dc4eb5029a84b2a931a67ad9ebfd04a8f3417e42a7dfb2e76d8911b2540bcf9eff9cbf92708b158dd8f53dbcbe7be51682ac3ad4

        • C:\Users\Admin\AppData\Local\Temp\NEAS.de4b5e928199a90a4cc7841a32cedf20.exe

          Filesize

          1.0MB

          MD5

          beec185476f0c234229cc97f0bc6259c

          SHA1

          2f1c11dfdac947ece29d8e4558158926a0237c63

          SHA256

          7228b6a716d5524920de6f44c8ea81e3d144396252cc618640a2b476d24374a8

          SHA512

          8b6da10927e3770415068475431b2c3580e83242f5ed34cf4f002e2b09a15cd304d0ce64d02e9dc8158432673c5054e9f5fb3efe5bda4ddb4f810f8b942789dd

        • C:\WINDOWS\MSWDM.EXE

          Filesize

          256KB

          MD5

          8a1198209520897514a2d82a912a66d2

          SHA1

          5dda8ec47f948814d808cd71e89ebe65940a1ff7

          SHA256

          5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

          SHA512

          9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

        • C:\Windows\MSWDM.EXE

          Filesize

          256KB

          MD5

          8a1198209520897514a2d82a912a66d2

          SHA1

          5dda8ec47f948814d808cd71e89ebe65940a1ff7

          SHA256

          5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

          SHA512

          9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

        • C:\Windows\MSWDM.EXE

          Filesize

          256KB

          MD5

          8a1198209520897514a2d82a912a66d2

          SHA1

          5dda8ec47f948814d808cd71e89ebe65940a1ff7

          SHA256

          5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

          SHA512

          9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

        • C:\Windows\MSWDM.EXE

          Filesize

          256KB

          MD5

          8a1198209520897514a2d82a912a66d2

          SHA1

          5dda8ec47f948814d808cd71e89ebe65940a1ff7

          SHA256

          5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

          SHA512

          9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

        • C:\Windows\devBB9F.tmp

          Filesize

          794KB

          MD5

          c6d0721e9156eb2a40a04bb38be0b2a5

          SHA1

          d0a3fcb3ad9f227a02d30abb767883b42fecc3a7

          SHA256

          2435e1e50c097608e6157efb1036946cfdd02d86728e8e00a02b207bee36e60d

          SHA512

          e254db10a7cffc4fe8c2d126dc4eb5029a84b2a931a67ad9ebfd04a8f3417e42a7dfb2e76d8911b2540bcf9eff9cbf92708b158dd8f53dbcbe7be51682ac3ad4