Analysis

  • max time kernel
    14s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    21/10/2023, 21:24

General

  • Target

    NEAS.8115d0740108dce3a31e9f3f7ac798e0.exe

  • Size

    267KB

  • MD5

    8115d0740108dce3a31e9f3f7ac798e0

  • SHA1

    1c232d5a01b9107d4e52370ca868ed1f494520c5

  • SHA256

    521cdcb345d3ae0fde0bc3c6e3fdfa2816dce9fbb2bbcfcb82a62814a8f02b54

  • SHA512

    61ac24c4728a6eb0aa33e0f19dd207d4d64038d193bafa78c9c10f4f17f2fe98433dd774691ef751eaf9180431e7f862e43c756c748684df6cfb5cfd834492ba

  • SSDEEP

    3072:WcX93xwq19gL2SjGojCJa79TBfsY5vXWqvuHcYnLzqP2QV:WcNhJgX9z9TB0YRX8n6V

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.8115d0740108dce3a31e9f3f7ac798e0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.8115d0740108dce3a31e9f3f7ac798e0.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2184
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev52E1.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.8115d0740108dce3a31e9f3f7ac798e0.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1892
      • C:\Users\Admin\AppData\Local\Temp\NEAS.8115D0740108DCE3A31E9F3F7AC798E0.EXE
        3⤵
        • Sets service image path in registry
        • Executes dropped EXE
        • Suspicious behavior: LoadsDriver
        • Suspicious use of AdjustPrivilegeToken
        PID:2276
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev52E1.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.8115D0740108DCE3A31E9F3F7AC798E0.EXE!
        3⤵
        • Executes dropped EXE
        PID:2760

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\NEAS.8115d0740108dce3a31e9f3f7ac798e0.exe

          Filesize

          11KB

          MD5

          b5f8d0c67b41eb650ddf4cc59ce48cae

          SHA1

          288f7a4b88df49875f534313cb32bd974d3278dd

          SHA256

          a495a79d9640aa57b33850b0594b4477659fcb1aa754ce0f3867252a8966ba27

          SHA512

          fdaf1dc4f20893cfbd525ef27dc7f719133751df33ff17e95f9abe430f880c140e8874e8fb499e9f94fcb3505d178974e2474002afa0f7fbc8978a1e188df6d5

        • C:\Users\Admin\AppData\Local\Temp\NEAS.8115d0740108dce3a31e9f3f7ac798e0.exe

          Filesize

          11KB

          MD5

          b5f8d0c67b41eb650ddf4cc59ce48cae

          SHA1

          288f7a4b88df49875f534313cb32bd974d3278dd

          SHA256

          a495a79d9640aa57b33850b0594b4477659fcb1aa754ce0f3867252a8966ba27

          SHA512

          fdaf1dc4f20893cfbd525ef27dc7f719133751df33ff17e95f9abe430f880c140e8874e8fb499e9f94fcb3505d178974e2474002afa0f7fbc8978a1e188df6d5

        • C:\WINDOWS\MSWDM.EXE

          Filesize

          256KB

          MD5

          8a1198209520897514a2d82a912a66d2

          SHA1

          5dda8ec47f948814d808cd71e89ebe65940a1ff7

          SHA256

          5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

          SHA512

          9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

        • C:\Windows\MSWDM.EXE

          Filesize

          256KB

          MD5

          8a1198209520897514a2d82a912a66d2

          SHA1

          5dda8ec47f948814d808cd71e89ebe65940a1ff7

          SHA256

          5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

          SHA512

          9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

        • C:\Windows\MSWDM.EXE

          Filesize

          256KB

          MD5

          8a1198209520897514a2d82a912a66d2

          SHA1

          5dda8ec47f948814d808cd71e89ebe65940a1ff7

          SHA256

          5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

          SHA512

          9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

        • C:\Windows\MSWDM.EXE

          Filesize

          256KB

          MD5

          8a1198209520897514a2d82a912a66d2

          SHA1

          5dda8ec47f948814d808cd71e89ebe65940a1ff7

          SHA256

          5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

          SHA512

          9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

        • C:\Windows\MSWDM.EXE

          Filesize

          256KB

          MD5

          8a1198209520897514a2d82a912a66d2

          SHA1

          5dda8ec47f948814d808cd71e89ebe65940a1ff7

          SHA256

          5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

          SHA512

          9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

        • C:\Windows\dev52E1.tmp

          Filesize

          11KB

          MD5

          b5f8d0c67b41eb650ddf4cc59ce48cae

          SHA1

          288f7a4b88df49875f534313cb32bd974d3278dd

          SHA256

          a495a79d9640aa57b33850b0594b4477659fcb1aa754ce0f3867252a8966ba27

          SHA512

          fdaf1dc4f20893cfbd525ef27dc7f719133751df33ff17e95f9abe430f880c140e8874e8fb499e9f94fcb3505d178974e2474002afa0f7fbc8978a1e188df6d5

        • \Users\Admin\AppData\Local\Temp\NEAS.8115d0740108dce3a31e9f3f7ac798e0.exe

          Filesize

          11KB

          MD5

          b5f8d0c67b41eb650ddf4cc59ce48cae

          SHA1

          288f7a4b88df49875f534313cb32bd974d3278dd

          SHA256

          a495a79d9640aa57b33850b0594b4477659fcb1aa754ce0f3867252a8966ba27

          SHA512

          fdaf1dc4f20893cfbd525ef27dc7f719133751df33ff17e95f9abe430f880c140e8874e8fb499e9f94fcb3505d178974e2474002afa0f7fbc8978a1e188df6d5

        • \Users\Admin\AppData\Local\Temp\NEAS.8115d0740108dce3a31e9f3f7ac798e0.exe

          Filesize

          11KB

          MD5

          b5f8d0c67b41eb650ddf4cc59ce48cae

          SHA1

          288f7a4b88df49875f534313cb32bd974d3278dd

          SHA256

          a495a79d9640aa57b33850b0594b4477659fcb1aa754ce0f3867252a8966ba27

          SHA512

          fdaf1dc4f20893cfbd525ef27dc7f719133751df33ff17e95f9abe430f880c140e8874e8fb499e9f94fcb3505d178974e2474002afa0f7fbc8978a1e188df6d5

        • memory/1892-22-0x0000000000220000-0x0000000000225000-memory.dmp

          Filesize

          20KB

        • memory/1892-24-0x0000000000220000-0x0000000000225000-memory.dmp

          Filesize

          20KB

        • memory/2276-23-0x0000000000400000-0x0000000000405000-memory.dmp

          Filesize

          20KB