Analysis

  • max time kernel
    240s
  • max time network
    285s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    21/10/2023, 21:19

General

  • Target

    NEAS.478f06b507d3745af32878309fa41290.exe

  • Size

    62KB

  • MD5

    478f06b507d3745af32878309fa41290

  • SHA1

    3a18b63cced0835bc260a929cc48a7ff22e0c38d

  • SHA256

    d1f3c334e9d1587e1ffc6f45e99743b3e02c79cc926598d29f0f657e78b1d115

  • SHA512

    ce6dfbd29577e1c0fb0321fc5740f80ab96f765901e95729d4effc6b5d413c523785c336bd98f45dcd1a58b2060323b1beee3acda8a9b0dd655da8b5f3926b71

  • SSDEEP

    1536:y4QQ6NSyM61l19piO+LV8YEoI/EU9RUe4my5kqxz:y4X6NSyfnpijeYEoIcq4B5l

Score
7/10

Malware Config

Signatures

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.478f06b507d3745af32878309fa41290.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.478f06b507d3745af32878309fa41290.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    PID:2664

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\macromd\Blonde and Japanese girl bukkake.mpg.exe

          Filesize

          86KB

          MD5

          0dca5b81e251397e1bbe323a1505df27

          SHA1

          3cd5d617b91d9031e9820576ee8b3f1cc478daf2

          SHA256

          412d6b46ae7e855c39ea629484dcdc7d3e403fa740dfecbc7cbfb77df6af138b

          SHA512

          8668894cfe2503b4f3543bc3b927b0da4904cd90f9fdefa9a2cacc5fa879459346a66d28ee1c8ad68c256617afc4e528894598dce65c2e91b4a47c44a378b53e

        • memory/2664-0-0x0000000000400000-0x0000000000464000-memory.dmp

          Filesize

          400KB

        • memory/2664-15-0x0000000000400000-0x0000000000464000-memory.dmp

          Filesize

          400KB

        • memory/2664-18-0x0000000000400000-0x0000000000464000-memory.dmp

          Filesize

          400KB

        • memory/2664-28-0x0000000000400000-0x0000000000464000-memory.dmp

          Filesize

          400KB