Analysis
-
max time kernel
7s -
max time network
3s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
22-10-2023 17:15
Behavioral task
behavioral1
Sample
NEAS.1ee6f9b383ad595146e47b96ad311480.exe
Resource
win7-20230831-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.1ee6f9b383ad595146e47b96ad311480.exe
Resource
win10v2004-20231020-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
NEAS.1ee6f9b383ad595146e47b96ad311480.exe
-
Size
1.0MB
-
MD5
1ee6f9b383ad595146e47b96ad311480
-
SHA1
1ee08bb2ad7b01bee5a21922bc53b92b66d7b029
-
SHA256
86b67a091c0b66dbdd4c6a638e4e1fb70ec90c24da7cb58968bb50b7f4ee87a2
-
SHA512
c0637928187e9dab8894cbad979fb1822d8f47e00f3d49afaf3aae67f0696a833a5b6911e5f6048eeaec458d2057177f7f758b670aa0544238db6e7ce512be25
-
SSDEEP
24576:Au6J33O0c+JY5UZ+XC0kGsoThLQtqY2Kj0/WY7:qu0c++OCvkGsEhL4q1m0OY7
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2160-0-0x0000000000890000-0x000000000099A000-memory.dmp upx behavioral1/memory/2160-3-0x0000000000890000-0x000000000099A000-memory.dmp upx -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2160-0-0x0000000000890000-0x000000000099A000-memory.dmp autoit_exe behavioral1/memory/2160-3-0x0000000000890000-0x000000000099A000-memory.dmp autoit_exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2160 NEAS.1ee6f9b383ad595146e47b96ad311480.exe 2160 NEAS.1ee6f9b383ad595146e47b96ad311480.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2160 NEAS.1ee6f9b383ad595146e47b96ad311480.exe 2160 NEAS.1ee6f9b383ad595146e47b96ad311480.exe 2160 NEAS.1ee6f9b383ad595146e47b96ad311480.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2160 NEAS.1ee6f9b383ad595146e47b96ad311480.exe 2160 NEAS.1ee6f9b383ad595146e47b96ad311480.exe 2160 NEAS.1ee6f9b383ad595146e47b96ad311480.exe