Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
28-10-2023 18:04
Behavioral task
behavioral1
Sample
NEAS.2bb810388c6c611155441bdaa7e64800.exe
Resource
win7-20231020-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.2bb810388c6c611155441bdaa7e64800.exe
Resource
win10v2004-20231020-en
6 signatures
150 seconds
General
-
Target
NEAS.2bb810388c6c611155441bdaa7e64800.exe
-
Size
45KB
-
MD5
2bb810388c6c611155441bdaa7e64800
-
SHA1
ded4fad2b949ff4bef514aa93bd85af378427ca4
-
SHA256
69f213fb24f163b9c516da07e73a730e7fa8aaf78fd047960d011d046780d7e2
-
SHA512
7e86ae2d8d1dfa64c10bb24b82a8d07b98bcb04fdf8ab001a9ba16a9bf043e7049381c6dfbfe1e5905084bbdc19fbf98a43c0619ed5858ceaac1280f36160989
-
SSDEEP
768:DhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:VsWE9N5dFu53dsniQaB/xZ14n7zIF+qr
Score
10/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2292-0-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Windows\CurrentVersion\Run\BB733309 = "C:\\Users\\Admin\\AppData\\Roaming\\BB733309\\bin.exe" winver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe 2412 winver.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1236 Explorer.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2412 winver.exe 1236 Explorer.EXE 1236 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1236 Explorer.EXE 1236 Explorer.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2412 2292 NEAS.2bb810388c6c611155441bdaa7e64800.exe 29 PID 2292 wrote to memory of 2412 2292 NEAS.2bb810388c6c611155441bdaa7e64800.exe 29 PID 2292 wrote to memory of 2412 2292 NEAS.2bb810388c6c611155441bdaa7e64800.exe 29 PID 2292 wrote to memory of 2412 2292 NEAS.2bb810388c6c611155441bdaa7e64800.exe 29 PID 2292 wrote to memory of 2412 2292 NEAS.2bb810388c6c611155441bdaa7e64800.exe 29 PID 2412 wrote to memory of 1236 2412 winver.exe 8 PID 2412 wrote to memory of 1112 2412 winver.exe 10 PID 2412 wrote to memory of 1184 2412 winver.exe 9 PID 2412 wrote to memory of 1236 2412 winver.exe 8
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2bb810388c6c611155441bdaa7e64800.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2bb810388c6c611155441bdaa7e64800.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\winver.exewinver2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2412
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1236
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1184
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112