Analysis
-
max time kernel
127s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2023 21:19
Behavioral task
behavioral1
Sample
NEAS.4c33cf5b1c2447a1ee35dce93bd72460.dll
Resource
win7-20230831-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.4c33cf5b1c2447a1ee35dce93bd72460.dll
Resource
win10v2004-20231020-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
NEAS.4c33cf5b1c2447a1ee35dce93bd72460.dll
-
Size
76KB
-
MD5
4c33cf5b1c2447a1ee35dce93bd72460
-
SHA1
6f2ab34c5eacdc77a3962fb5291855116e16f51b
-
SHA256
a7ca6511d16aa9a8bc6cc248bb778920373173649f0e875dc64a324c0173f454
-
SHA512
d6c4ae51448e2e79c474770aa889e7b5923e10d3e2c6c6c4b690824e76ec53cba090b3cd722d8282a744f6f90b43317c21b3e624772a26a51b3c9b6c7e114acb
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZIvjKeytoB5kr:c8y93KQjy7G55riF1cMo03evL5kr
Score
8/10
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
resource yara_rule behavioral2/memory/1148-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/1148-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 5092 1148 WerFault.exe 85 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1148 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4024 wrote to memory of 1148 4024 rundll32.exe 85 PID 4024 wrote to memory of 1148 4024 rundll32.exe 85 PID 4024 wrote to memory of 1148 4024 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.4c33cf5b1c2447a1ee35dce93bd72460.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.4c33cf5b1c2447a1ee35dce93bd72460.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:1148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 7083⤵
- Program crash
PID:5092
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1148 -ip 11481⤵PID:4140