Analysis
-
max time kernel
140s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 21:22
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.67f6dc87ac43716022e9a4522d6a5670.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.67f6dc87ac43716022e9a4522d6a5670.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.67f6dc87ac43716022e9a4522d6a5670.exe
-
Size
89KB
-
MD5
67f6dc87ac43716022e9a4522d6a5670
-
SHA1
667bd7735493111af2f2ee58463eeabb974dc500
-
SHA256
32e44400d1be59d33b5523157d730027b90acad2b08ab83c29d50e0735ca8e3e
-
SHA512
a1b1fe3435b9f89158091cf9c6a691cda55a514324bfe77e28a0dfd786d49de555b86d7d0dd44d6cf54e621b840fcbda9ea399514ed8132b7b19d889224768bb
-
SSDEEP
768:epGH/U+JdMk7JwOeUsCPxKcTFv4LdYPofXKCC6FQxB:eY9vZ7J8CJKcT6JWov8y4B
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1232 smss.exe 2744 smss.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\smss.exe NEAS.67f6dc87ac43716022e9a4522d6a5670.exe File created C:\Windows\system\smss.exe NEAS.67f6dc87ac43716022e9a4522d6a5670.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3760 wrote to memory of 4896 3760 NEAS.67f6dc87ac43716022e9a4522d6a5670.exe 83 PID 3760 wrote to memory of 4896 3760 NEAS.67f6dc87ac43716022e9a4522d6a5670.exe 83 PID 3760 wrote to memory of 4896 3760 NEAS.67f6dc87ac43716022e9a4522d6a5670.exe 83 PID 4896 wrote to memory of 1232 4896 cmd.exe 85 PID 4896 wrote to memory of 1232 4896 cmd.exe 85 PID 4896 wrote to memory of 1232 4896 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.67f6dc87ac43716022e9a4522d6a5670.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.67f6dc87ac43716022e9a4522d6a5670.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system\smss.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\system\smss.exeC:\Windows\system\smss.exe3⤵
- Executes dropped EXE
PID:1232
-
-
-
C:\Windows\system\smss.exeC:\Windows\system\smss.exe1⤵
- Executes dropped EXE
PID:2744
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD567f6dc87ac43716022e9a4522d6a5670
SHA1667bd7735493111af2f2ee58463eeabb974dc500
SHA25632e44400d1be59d33b5523157d730027b90acad2b08ab83c29d50e0735ca8e3e
SHA512a1b1fe3435b9f89158091cf9c6a691cda55a514324bfe77e28a0dfd786d49de555b86d7d0dd44d6cf54e621b840fcbda9ea399514ed8132b7b19d889224768bb
-
Filesize
89KB
MD567f6dc87ac43716022e9a4522d6a5670
SHA1667bd7735493111af2f2ee58463eeabb974dc500
SHA25632e44400d1be59d33b5523157d730027b90acad2b08ab83c29d50e0735ca8e3e
SHA512a1b1fe3435b9f89158091cf9c6a691cda55a514324bfe77e28a0dfd786d49de555b86d7d0dd44d6cf54e621b840fcbda9ea399514ed8132b7b19d889224768bb
-
Filesize
89KB
MD567f6dc87ac43716022e9a4522d6a5670
SHA1667bd7735493111af2f2ee58463eeabb974dc500
SHA25632e44400d1be59d33b5523157d730027b90acad2b08ab83c29d50e0735ca8e3e
SHA512a1b1fe3435b9f89158091cf9c6a691cda55a514324bfe77e28a0dfd786d49de555b86d7d0dd44d6cf54e621b840fcbda9ea399514ed8132b7b19d889224768bb
-
Filesize
89KB
MD567f6dc87ac43716022e9a4522d6a5670
SHA1667bd7735493111af2f2ee58463eeabb974dc500
SHA25632e44400d1be59d33b5523157d730027b90acad2b08ab83c29d50e0735ca8e3e
SHA512a1b1fe3435b9f89158091cf9c6a691cda55a514324bfe77e28a0dfd786d49de555b86d7d0dd44d6cf54e621b840fcbda9ea399514ed8132b7b19d889224768bb