Analysis

  • max time kernel
    122s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    28-10-2023 18:04

General

  • Target

    NEAS.24e352ed5f07190fc26dc9cc13def710.exe

  • Size

    136KB

  • MD5

    24e352ed5f07190fc26dc9cc13def710

  • SHA1

    4fb3cb0db3992c6e47b66045a02a96296f660361

  • SHA256

    f23ee028dbd2ffeb20eac898a1cd1d72acbb732a3e09a88fbceb9c7d1dbef5d5

  • SHA512

    3d14bd24fb4f96b300b924cf2d15433516aa525aa4945b1ed342f922f825263ff9641eeba8ecb180e8fa1a1387cc770b95bff85a4a4e5d3576bf431aca46dace

  • SSDEEP

    3072:g6pQc+sSxnTrGadgsFqZeo4pwkhUmZr3hPsOraSo:g6p2sSxTrGvsFUejWyZr3hPswaH

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.24e352ed5f07190fc26dc9cc13def710.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.24e352ed5f07190fc26dc9cc13def710.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\ProgramData\rhkD886.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\NEAS.24e352ed5f07190fc26dc9cc13def710.exe""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Windows\SysWOW64\attrib.exe
        attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\NEAS.24e352ed5f07190fc26dc9cc13def710.exe"
        3⤵
        • Views/modifies file attributes
        PID:2628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\rhkD886.tmp.bat

    Filesize

    54B

    MD5

    3051f531e4a3cf8e003de3fbae2f9ba2

    SHA1

    c4bb70da177e23ad3f33b2b6211d3ffab53e16b1

    SHA256

    943d6a646333d4ddd11ff9579882c70df1950520cad007f5789a87b7b378202d

    SHA512

    d212fd78ef8907d8aa30948b040a0358a1f89408fc68aacb865a1e310eab9b54675a4d2c0454af01509413e4894081cf26816224227f949e04ab7cafe2d45ee2

  • C:\ProgramData\rhkD886.tmp.bat

    Filesize

    54B

    MD5

    3051f531e4a3cf8e003de3fbae2f9ba2

    SHA1

    c4bb70da177e23ad3f33b2b6211d3ffab53e16b1

    SHA256

    943d6a646333d4ddd11ff9579882c70df1950520cad007f5789a87b7b378202d

    SHA512

    d212fd78ef8907d8aa30948b040a0358a1f89408fc68aacb865a1e310eab9b54675a4d2c0454af01509413e4894081cf26816224227f949e04ab7cafe2d45ee2

  • memory/2588-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2588-16-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB