Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
22/10/2023, 17:21
Behavioral task
behavioral1
Sample
NEAS.74952627c519a0373c828fe31a495ff0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.74952627c519a0373c828fe31a495ff0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.74952627c519a0373c828fe31a495ff0.exe
-
Size
90KB
-
MD5
74952627c519a0373c828fe31a495ff0
-
SHA1
37c0b4f03b09ede0dc74e8193c1ee0e1619e98be
-
SHA256
d7cff6bdfda2375cb8f15283f406a18cfb9dff694c8041c5d46023e338e173d5
-
SHA512
a2612c396d48ff26113027e679365e19a7d851627a6e33361158bbfa7176281af8777d23a160fbc007aa3e2de1068fb9c1fa2f49d9b095953f8277f16874efe4
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp0x:AnBdOOtEvwDpj6zp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3060 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2452 NEAS.74952627c519a0373c828fe31a495ff0.exe -
resource yara_rule behavioral1/memory/2452-0-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x000d00000001201d-11.dat upx behavioral1/files/0x000d00000001201d-14.dat upx behavioral1/memory/2452-15-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x000d00000001201d-24.dat upx behavioral1/memory/3060-25-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2452 wrote to memory of 3060 2452 NEAS.74952627c519a0373c828fe31a495ff0.exe 28 PID 2452 wrote to memory of 3060 2452 NEAS.74952627c519a0373c828fe31a495ff0.exe 28 PID 2452 wrote to memory of 3060 2452 NEAS.74952627c519a0373c828fe31a495ff0.exe 28 PID 2452 wrote to memory of 3060 2452 NEAS.74952627c519a0373c828fe31a495ff0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.74952627c519a0373c828fe31a495ff0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.74952627c519a0373c828fe31a495ff0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD55e12aeb0372d713d04adce36ffc0b7f3
SHA11d3265c6859ae1f13b8d29420bcfbf045e8b6b7c
SHA256d3ce3ee3897445a89ddf93c223019e8d048d4d01f9359357c5dcd81a10dd1b31
SHA5129cb0813a1bad37e6dc9cdf7fcb312f3c90dbb3ac48922277ee8bd76b048174a824515ab4094881a1c3e894da33e4545b324c73609730bfb73ac56cd991fcb51e
-
Filesize
90KB
MD55e12aeb0372d713d04adce36ffc0b7f3
SHA11d3265c6859ae1f13b8d29420bcfbf045e8b6b7c
SHA256d3ce3ee3897445a89ddf93c223019e8d048d4d01f9359357c5dcd81a10dd1b31
SHA5129cb0813a1bad37e6dc9cdf7fcb312f3c90dbb3ac48922277ee8bd76b048174a824515ab4094881a1c3e894da33e4545b324c73609730bfb73ac56cd991fcb51e
-
Filesize
90KB
MD55e12aeb0372d713d04adce36ffc0b7f3
SHA11d3265c6859ae1f13b8d29420bcfbf045e8b6b7c
SHA256d3ce3ee3897445a89ddf93c223019e8d048d4d01f9359357c5dcd81a10dd1b31
SHA5129cb0813a1bad37e6dc9cdf7fcb312f3c90dbb3ac48922277ee8bd76b048174a824515ab4094881a1c3e894da33e4545b324c73609730bfb73ac56cd991fcb51e