Analysis
-
max time kernel
42s -
max time network
42s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 21:37
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f778310e642462d944338865d83f5620.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.f778310e642462d944338865d83f5620.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.f778310e642462d944338865d83f5620.exe
-
Size
68KB
-
MD5
f778310e642462d944338865d83f5620
-
SHA1
aecdb95795f3f85ac9c90860c55c397338af5eda
-
SHA256
b3afd53b5dac296db540456da9de169aa45d018d0db897d669463e2789720c0e
-
SHA512
cc2c6f640dec01c226affcc8beca01a62390fcfb2009fdf8ef2bef316bfb12e7266c9186ceb6201f193fd8618e947b8a7a07816fb29f1efff70afa54c17d63c5
-
SSDEEP
1536:jfBoWdHaDL1UOUc01anifKUYJFqLa49qQ:jCWdHaDhocDGKU4t49qQ
Malware Config
Signatures
-
Runs .reg file with regedit 2 IoCs
pid Process 4080 regedit.exe 4920 regedit.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2404 2248 NEAS.f778310e642462d944338865d83f5620.exe 89 PID 2248 wrote to memory of 2404 2248 NEAS.f778310e642462d944338865d83f5620.exe 89 PID 2248 wrote to memory of 2404 2248 NEAS.f778310e642462d944338865d83f5620.exe 89 PID 2404 wrote to memory of 4080 2404 cmd.exe 91 PID 2404 wrote to memory of 4080 2404 cmd.exe 91 PID 2404 wrote to memory of 4080 2404 cmd.exe 91 PID 2404 wrote to memory of 4920 2404 cmd.exe 93 PID 2404 wrote to memory of 4920 2404 cmd.exe 93 PID 2404 wrote to memory of 4920 2404 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f778310e642462d944338865d83f5620.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f778310e642462d944338865d83f5620.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\bt14585.bat "C:\Users\Admin\AppData\Local\Temp\NEAS.f778310e642462d944338865d83f5620.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S "C:\Users\Admin\AppData\Local\Temp.\DefOpen.reg"3⤵
- Runs .reg file with regedit
PID:4080
-
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S "C:\Users\Admin\AppData\Local\Temp.\DefOpen.reg"3⤵
- Runs .reg file with regedit
PID:4920
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD58de823ad7b15de6226a41e7f9d086a3f
SHA153f07b268f52763a37d2d691f6b97940d994242e
SHA256357869beb1a2abeb38e7bd0c81fa1568a7f9e4edef0f7f8d78718a9125b61786
SHA512a15c6ce254da1d51e07f11237633a62ae2c12dd19f6f08e3a821533f17c7cc4a0b898f376581912575f71a8d9d88d93d24f0e34093698c408de92c956856c4bd
-
Filesize
706B
MD5a9a552291b7620dd2eea40ee82c27afe
SHA119d34e8f828d69a8b0c092ff6f1864f8e3b1f837
SHA256a7840e62381325ced2066410d4faea3cb548c3a8f1034a4ab7473f03561d693e
SHA512e4d4ae3adadc6f840b52f3a64a966af3c4f4f09e23a0d5b733ae468d9bccbdf248b0278628c6054d322d04bdd7366faca1f261fa497bfbbb37f5978565927fd2
-
Filesize
682B
MD5c662a7b9369aa91da7d63182b3c10580
SHA1a24bfd2a9cc42eb84f466c70d152c57710b3a4c7
SHA256f12105f39436cf02de79e3b87419a6a10c8915a153eabf97fad376f9593184ec
SHA512cc424ea2404fe7bda35141fc79e4c143228af0c0dfbc8f1a7981c3e9320e9d172112e60bcd2a97f5a04f64c721974c04eb1355aeb0bd5b0f2570b00d0326d7eb
-
Filesize
86B
MD51e703dd91fb10ee673cb6ada1b08dfe1
SHA1a726be2a3a09f00174dc191f1ed88c82a01d3d52
SHA25604d0e541986c6d663c4fee8b93734e6731f2f3d44826f34bad37d38b32a9e92c
SHA512f6f5e6889784810a03d802671597df978b299dea0c1a1e6ae55a0caa39ddc7b6f5774a6df3123cd33b5823cb39f4ab47dc32186d1b2cbd7f4bec66fa42854ac6
-
Filesize
6KB
MD5520b3ce8aab69a627bd4b98b33620881
SHA130c841bcc2158f0b9f264a9174891e2da9912c03
SHA2563cbf51b12bfd92d34f90dff5548779093737dd172ad006e89e0a367b4ef5ae4b
SHA5122f62d38e276a78091664f2001f243da2b41f957c645f9b0fa2fb3ed80ea7de090a02f4a1c4c2aeded5359b4f1ef5c096a65123e0b3ae8b170645737a400de57e