Analysis
-
max time kernel
8s -
max time network
13s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2023 18:04
Behavioral task
behavioral1
Sample
NEAS.2bb810388c6c611155441bdaa7e64800.exe
Resource
win7-20231020-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.2bb810388c6c611155441bdaa7e64800.exe
Resource
win10v2004-20231020-en
6 signatures
150 seconds
General
-
Target
NEAS.2bb810388c6c611155441bdaa7e64800.exe
-
Size
45KB
-
MD5
2bb810388c6c611155441bdaa7e64800
-
SHA1
ded4fad2b949ff4bef514aa93bd85af378427ca4
-
SHA256
69f213fb24f163b9c516da07e73a730e7fa8aaf78fd047960d011d046780d7e2
-
SHA512
7e86ae2d8d1dfa64c10bb24b82a8d07b98bcb04fdf8ab001a9ba16a9bf043e7049381c6dfbfe1e5905084bbdc19fbf98a43c0619ed5858ceaac1280f36160989
-
SSDEEP
768:DhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:VsWE9N5dFu53dsniQaB/xZ14n7zIF+qr
Score
10/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2684-0-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9145AAC4 = "C:\\Users\\Admin\\AppData\\Roaming\\9145AAC4\\bin.exe" winver.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4452 winver.exe 4452 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4452 winver.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2684 wrote to memory of 4452 2684 NEAS.2bb810388c6c611155441bdaa7e64800.exe 89 PID 2684 wrote to memory of 4452 2684 NEAS.2bb810388c6c611155441bdaa7e64800.exe 89 PID 2684 wrote to memory of 4452 2684 NEAS.2bb810388c6c611155441bdaa7e64800.exe 89 PID 2684 wrote to memory of 4452 2684 NEAS.2bb810388c6c611155441bdaa7e64800.exe 89 PID 4452 wrote to memory of 3160 4452 winver.exe 51 PID 4452 wrote to memory of 2316 4452 winver.exe 57 PID 4452 wrote to memory of 2336 4452 winver.exe 56 PID 4452 wrote to memory of 2400 4452 winver.exe 22 PID 4452 wrote to memory of 3160 4452 winver.exe 51 PID 4452 wrote to memory of 3472 4452 winver.exe 50 PID 4452 wrote to memory of 3692 4452 winver.exe 49
Processes
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2400
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3692
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3472
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2bb810388c6c611155441bdaa7e64800.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2bb810388c6c611155441bdaa7e64800.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4452
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2336
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2316