Analysis

  • max time kernel
    121s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    21-10-2023 21:16

General

  • Target

    NEAS.312a629f71fc711d2c3f21fb0226b4b0.exe

  • Size

    8.5MB

  • MD5

    312a629f71fc711d2c3f21fb0226b4b0

  • SHA1

    9d6da5804b4f58acbde3c419276ce255c338812e

  • SHA256

    0e2c9c41d0d9e5f72e6d875f960ce08f0a92bc4ba5d412c9cbaadd1c3d5a1644

  • SHA512

    b9819dce8b98fb83387b96e2867a7d6b0b969740d6d23d565cd8dc728cb0944a716772fa15c50de7cc29e3018297a29d39718df688cc63697f937acc26f66fe7

  • SSDEEP

    196608:A4B9KPY67aLHOGHV2aOsntswWbtYJt/6p3KB6jNQ0CS:j9KA1LHOH7CtswWZ4u7+S

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.312a629f71fc711d2c3f21fb0226b4b0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.312a629f71fc711d2c3f21fb0226b4b0.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3000 -s 2276
      2⤵
      • Program crash
      PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3000-1-0x0000000000FB0000-0x0000000001838000-memory.dmp

    Filesize

    8.5MB

  • memory/3000-0-0x00000000746A0000-0x0000000074D8E000-memory.dmp

    Filesize

    6.9MB

  • memory/3000-2-0x0000000005350000-0x0000000005390000-memory.dmp

    Filesize

    256KB

  • memory/3000-3-0x0000000007A20000-0x00000000080CC000-memory.dmp

    Filesize

    6.7MB

  • memory/3000-4-0x0000000000840000-0x0000000000890000-memory.dmp

    Filesize

    320KB

  • memory/3000-5-0x00000000008A0000-0x00000000008BC000-memory.dmp

    Filesize

    112KB

  • memory/3000-6-0x0000000008820000-0x00000000088BE000-memory.dmp

    Filesize

    632KB

  • memory/3000-7-0x0000000000950000-0x000000000095A000-memory.dmp

    Filesize

    40KB

  • memory/3000-8-0x00000000746A0000-0x0000000074D8E000-memory.dmp

    Filesize

    6.9MB

  • memory/3000-9-0x0000000000950000-0x000000000095A000-memory.dmp

    Filesize

    40KB