Analysis

  • max time kernel
    145s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/10/2023, 21:14

General

  • Target

    NEAS.15b62a3a32d002d3faafb488dec1f410.exe

  • Size

    600KB

  • MD5

    15b62a3a32d002d3faafb488dec1f410

  • SHA1

    2266a4a79e446e8c5d9f4b7c7ed02b3abe44a5ff

  • SHA256

    06bb1c5e4c87467483aa4cff7caad8046eae27e9461fe8ec87b37f9e6fc8fb55

  • SHA512

    7412e9380749dd80b4dd38636e378a120ee664a88c06291c3ab5be45b9fd24b549ebdc12984751268472cb8914dd40d3a1ce4f4291c59b61fd2e3666e8b0b9d0

  • SSDEEP

    12288:+FeramCErWTRW8fdeA6YFlIX5lm8W6v5VLOR0i:OeraNEiTRW8fdeEOX5RvDA0i

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.15b62a3a32d002d3faafb488dec1f410.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.15b62a3a32d002d3faafb488dec1f410.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:652
    • C:\Users\Admin\AppData\Local\Temp\B98C.tmp
      C:\Users\Admin\AppData\Local\Temp\B98C.tmp
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:1016

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

          Filesize

          4KB

          MD5

          1bfe591a4fe3d91b03cdf26eaacd8f89

          SHA1

          719c37c320f518ac168c86723724891950911cea

          SHA256

          9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

          SHA512

          02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\59D76868C250B3240414CE3EFBB12518_809DE37BF6F91747203FF7559791C460

          Filesize

          471B

          MD5

          c97729e2b44e500be22bffd54e4bf58a

          SHA1

          78f4bbdc38ed588359887e051b306ba6c6c58082

          SHA256

          1816a9de15b036535c9c6ca3c344f8c6f640481517feb98048f86b1a47c2c9a8

          SHA512

          d25ac18030a0caf738e30cd5465bfbaf7e55b39e0b592870e77be89a32392e6275c1093809dad038ddbe39517731b00ef13ceb2e116de48134e5f021899873fd

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419

          Filesize

          471B

          MD5

          d5dca730df319f765eb1b1cee9c3708d

          SHA1

          933b4c5ceb314e4d8c2fc332355a9c17d7b2c0e5

          SHA256

          d3f39b6306671bf1eaae163b2c478e5e9900273187893da4eb8be7e72bcee2cc

          SHA512

          e20e60c3447b567a90deab7a554d631f1e70cad91933ffe9e2c8e1e1e8ad3102f1a5f27e92a9688c049b8fbe15d6d5070f246d874cb2853f7725a00622c02912

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

          Filesize

          338B

          MD5

          2505d28e4e88da051ab9a07d399b6771

          SHA1

          260245e442043058557bf3c77d61cd1f074d22c0

          SHA256

          72710b77a68dddd277146ca1fd470362db341c644d2574fa788610a85cdc2c14

          SHA512

          452e23730bdc0277206e374b3bdf2bbd995bcf413d3f417dc183d89417ca19c48e0634466b1405031822c8021d74a6c3f1ffe805e11d87c7283de1045d633e9e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\59D76868C250B3240414CE3EFBB12518_809DE37BF6F91747203FF7559791C460

          Filesize

          404B

          MD5

          372b11abfe8624f65afc74887363de65

          SHA1

          bd95c4763b3a416c1922faf1e8e078c7c59d36d0

          SHA256

          ce03ea81b1b8fa3ddb9ef5d3620f4eb56c70e4ffbaa264950afcd6ece773170d

          SHA512

          86b88f3560ae4de200a15c2a2f1e627d56d2907d983247780860dee4942d7264797a6c79b8364caccf846d873adc2e80020f60097a368df480d5d9fcda71daae

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419

          Filesize

          412B

          MD5

          aae8f1d37fcef3df2bff9e887a8af9cf

          SHA1

          8f618eef4dcf47e99b9dd3ab07178aaf0f00d243

          SHA256

          006a1f9b37de3ee2667098e0258664b7e86b8393e5000b6dd0906904ac6fc8ba

          SHA512

          785a42c508c9304c5565b58068613c6cb03c985666c6e787828c121fefb8e448a36bb1296d13999ac17285924b2526a49fb6d5b2010da177489b09a49bf84d26

        • C:\Users\Admin\AppData\Local\Temp\B98C.tmp

          Filesize

          145KB

          MD5

          c610e7ccd6859872c585b2a85d7dc992

          SHA1

          362b3d4b72e3add687c209c79b500b7c6a246d46

          SHA256

          14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

          SHA512

          8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

        • C:\Users\Admin\AppData\Local\Temp\B98C.tmp

          Filesize

          145KB

          MD5

          c610e7ccd6859872c585b2a85d7dc992

          SHA1

          362b3d4b72e3add687c209c79b500b7c6a246d46

          SHA256

          14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

          SHA512

          8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

        • C:\Users\Admin\AppData\Roaming\Adobe\LogTransport2\LogTransport2.cfg

          Filesize

          3KB

          MD5

          fd1f28951b2c750eb6044619e213192c

          SHA1

          8ff721724908b9bb7498795aec38289c0cacc9f8

          SHA256

          34cd2ab843e2af267dc8d2dd62b0fc69508c97096c0a5cdf0fd6467c4f6f9ff1

          SHA512

          53a36ed24ad6be67f1bffb92bc3e16bf67d87abbe27a4f80951926ef44da93ea8b2375c62fe38dcfa3135ebf0d937027eb3f0e93d4d436b146d29ec45b68377d

        • C:\Users\Admin\AppData\Roaming\Adobe\Sonar\Sonar1.0\sonar_policy.xml

          Filesize

          17KB

          MD5

          7127539702867af35c2eb9757b191480

          SHA1

          b3b28103397d7bd2ef27010d5ea328ac047c6569

          SHA256

          ff14c841276ab90280ae4af4eaf2d7604e41e37d1925436a70f6faeda8e318f5

          SHA512

          12c124510b971e1ed546bb6d0276a327d8153bed6c96efa9a573190a37cccaca03338e5e219303094f4ef0895681776ac81dcee33d65009132747e4a8a9be2e0

        • memory/652-10-0x0000000000400000-0x000000000049A000-memory.dmp

          Filesize

          616KB

        • memory/652-26-0x0000000000400000-0x000000000049A000-memory.dmp

          Filesize

          616KB

        • memory/652-0-0x0000000000A50000-0x0000000000A92000-memory.dmp

          Filesize

          264KB

        • memory/652-1-0x0000000000A50000-0x0000000000A92000-memory.dmp

          Filesize

          264KB