Analysis
-
max time kernel
153s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 21:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.e8355e66dfaeecca7dcb27345453beb0.exe
Resource
win7-20231020-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.e8355e66dfaeecca7dcb27345453beb0.exe
Resource
win10v2004-20231020-en
3 signatures
150 seconds
General
-
Target
NEAS.e8355e66dfaeecca7dcb27345453beb0.exe
-
Size
4.6MB
-
MD5
e8355e66dfaeecca7dcb27345453beb0
-
SHA1
bcc7e0d22736d50ad83fda8ec92f62e1002639ac
-
SHA256
01cf8d520a2abb406eccf745cc22a890418f1b118f90192f76199ac3d18fdf2b
-
SHA512
540b4143643461120848667a8aa27c076ec1ddc61fa1b2b6f23df71e3013e3ca16ad5d814ea5449595f0be29c46b611624966d669f9a43eb0f756ba392eb13b9
-
SSDEEP
49152:zY3Nyry3hD44t1xVFVFsD4WUNy/LTzmElg4EWJMGmNPXFEFXCN7U0Zf2YOE+SvOU:WWy3hDLt1D3QsA
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5076-0-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/5076-2-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/5076-1-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/5076-3-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/5076-5-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/5076-7-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/5076-9-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/5076-11-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/5076-13-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/5076-15-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/5076-17-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/5076-19-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/5076-21-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/5076-23-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/5076-25-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/5076-27-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/5076-29-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/5076-31-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/5076-33-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/5076-35-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/5076-37-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/5076-39-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/5076-41-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/5076-43-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/5076-44-0x0000000010000000-0x000000001003F000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: 33 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: SeIncBasePriorityPrivilege 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: 33 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: SeIncBasePriorityPrivilege 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: 33 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: SeIncBasePriorityPrivilege 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: 33 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: SeIncBasePriorityPrivilege 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: 33 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: SeIncBasePriorityPrivilege 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: 33 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: SeIncBasePriorityPrivilege 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: 33 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: SeIncBasePriorityPrivilege 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: 33 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: SeIncBasePriorityPrivilege 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: 33 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: SeIncBasePriorityPrivilege 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: 33 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: SeIncBasePriorityPrivilege 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: 33 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: SeIncBasePriorityPrivilege 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: 33 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: SeIncBasePriorityPrivilege 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: 33 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: SeIncBasePriorityPrivilege 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: 33 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: SeIncBasePriorityPrivilege 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: 33 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: SeIncBasePriorityPrivilege 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: 33 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: SeIncBasePriorityPrivilege 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: 33 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: SeIncBasePriorityPrivilege 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: 33 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: SeIncBasePriorityPrivilege 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: 33 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: SeIncBasePriorityPrivilege 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: 33 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: SeIncBasePriorityPrivilege 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: 33 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: SeIncBasePriorityPrivilege 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: 33 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: SeIncBasePriorityPrivilege 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: 33 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe Token: SeIncBasePriorityPrivilege 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe 5076 NEAS.e8355e66dfaeecca7dcb27345453beb0.exe