Analysis
-
max time kernel
163s -
max time network
202s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
28-10-2023 20:19
Behavioral task
behavioral1
Sample
NEAS.fa5cb8a2c507cc0f4141beceeb3d49d0.exe
Resource
win7-20231020-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.fa5cb8a2c507cc0f4141beceeb3d49d0.exe
Resource
win10v2004-20231023-en
11 signatures
150 seconds
General
-
Target
NEAS.fa5cb8a2c507cc0f4141beceeb3d49d0.exe
-
Size
45KB
-
MD5
fa5cb8a2c507cc0f4141beceeb3d49d0
-
SHA1
4c4d1a18f943500fd4be8db435382e43cc43e2c6
-
SHA256
9adb63a85b887a2746fc8675947800cc4ee11ea220284d659e700bb2625d6c58
-
SHA512
49c3973ac6de02784060baaeed3062b05aba459e5365bcf78d4104875af233ba36e353273cdaef54d68c03bb3015306531b970effc4b7f073917571a2373a3b1
-
SSDEEP
768:+hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:SsWE9N5dFu53dsniQaB/xZ14n7zIF+qr
Score
10/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2780-0-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Windows\CurrentVersion\Run\49D525F6 = "C:\\Users\\Admin\\AppData\\Roaming\\49D525F6\\bin.exe" winver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe 2688 winver.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1304 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 winver.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2688 2780 NEAS.fa5cb8a2c507cc0f4141beceeb3d49d0.exe 31 PID 2780 wrote to memory of 2688 2780 NEAS.fa5cb8a2c507cc0f4141beceeb3d49d0.exe 31 PID 2780 wrote to memory of 2688 2780 NEAS.fa5cb8a2c507cc0f4141beceeb3d49d0.exe 31 PID 2780 wrote to memory of 2688 2780 NEAS.fa5cb8a2c507cc0f4141beceeb3d49d0.exe 31 PID 2780 wrote to memory of 2688 2780 NEAS.fa5cb8a2c507cc0f4141beceeb3d49d0.exe 31 PID 2688 wrote to memory of 1304 2688 winver.exe 5 PID 2688 wrote to memory of 1156 2688 winver.exe 14 PID 2688 wrote to memory of 1240 2688 winver.exe 13 PID 2688 wrote to memory of 1304 2688 winver.exe 5
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\NEAS.fa5cb8a2c507cc0f4141beceeb3d49d0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.fa5cb8a2c507cc0f4141beceeb3d49d0.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2688
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1240
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1156