Analysis

  • max time kernel
    148s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    21-10-2023 21:22

General

  • Target

    NEAS.65d47b0d5d2fc73114d75337461407c0.exe

  • Size

    1.8MB

  • MD5

    65d47b0d5d2fc73114d75337461407c0

  • SHA1

    c641c57202abc91093b0d3ee1e6630d1902edb83

  • SHA256

    848fec611993a22622cd8a3a575182a6f1563ee775d0b57414b85ca85b972d51

  • SHA512

    ae8a3cb446f4dd5eedf807525465f132c8bf5caff5cfc52471416786cd01abe71593e512e6c4bdffc6f45ca5ff1874d132369ab1e22dd2e78622f7a85e355903

  • SSDEEP

    24576:9EmvS3PLNyroPr4GGZdjfKRvI+2GRK43IZpKZy0tBAQTkI3223vBOSHVct6n:9E13D8c4GG/jfKCfGgzKEcuI3xvYSHV3

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 22 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.65d47b0d5d2fc73114d75337461407c0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.65d47b0d5d2fc73114d75337461407c0.exe"
    1⤵
      PID:2760
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2720

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2720-2-0x0000000004110000-0x0000000004111000-memory.dmp

      Filesize

      4KB

    • memory/2720-3-0x0000000004110000-0x0000000004111000-memory.dmp

      Filesize

      4KB

    • memory/2720-7-0x0000000002680000-0x0000000002690000-memory.dmp

      Filesize

      64KB

    • memory/2760-0-0x0000000000340000-0x00000000004ED000-memory.dmp

      Filesize

      1.7MB

    • memory/2760-1-0x0000000000340000-0x00000000004ED000-memory.dmp

      Filesize

      1.7MB