Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
28/10/2023, 19:55
Behavioral task
behavioral1
Sample
NEAS.6648dd6e742ccfdcfbb52c3bb20eab40.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.6648dd6e742ccfdcfbb52c3bb20eab40.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.6648dd6e742ccfdcfbb52c3bb20eab40.exe
-
Size
592KB
-
MD5
6648dd6e742ccfdcfbb52c3bb20eab40
-
SHA1
d63ffc1e4f031c5677dc350cefda04a56ce9e634
-
SHA256
45e88f2c225fa54e8a1ba46439b3ecc94f76d98b95273a6f6522d37950141cf2
-
SHA512
4e8aa16ffb408c4137574f9abce92cb429da3d6257052b40ecb518a24b18a69c3221671b3f5c0f8dfdeae60b4d308b8f60c969d308f07f0d8b4bf37b6f7ae7a9
-
SSDEEP
12288:y8Cmd8IvTnO5OzFugWiKCtPwMFmtUTbERkeJ:y8PNKAF/PwHKQRtJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2656 Install.exe -
Loads dropped DLL 3 IoCs
pid Process 2168 NEAS.6648dd6e742ccfdcfbb52c3bb20eab40.exe 2656 Install.exe 2656 Install.exe -
resource yara_rule behavioral1/memory/2168-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2168-31-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2656 Install.exe 2656 Install.exe 2656 Install.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2656 Install.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2656 2168 NEAS.6648dd6e742ccfdcfbb52c3bb20eab40.exe 28 PID 2168 wrote to memory of 2656 2168 NEAS.6648dd6e742ccfdcfbb52c3bb20eab40.exe 28 PID 2168 wrote to memory of 2656 2168 NEAS.6648dd6e742ccfdcfbb52c3bb20eab40.exe 28 PID 2168 wrote to memory of 2656 2168 NEAS.6648dd6e742ccfdcfbb52c3bb20eab40.exe 28 PID 2168 wrote to memory of 2656 2168 NEAS.6648dd6e742ccfdcfbb52c3bb20eab40.exe 28 PID 2168 wrote to memory of 2656 2168 NEAS.6648dd6e742ccfdcfbb52c3bb20eab40.exe 28 PID 2168 wrote to memory of 2656 2168 NEAS.6648dd6e742ccfdcfbb52c3bb20eab40.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6648dd6e742ccfdcfbb52c3bb20eab40.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6648dd6e742ccfdcfbb52c3bb20eab40.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Install.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300KB
MD5f6a62eb330e37ee7fa42050572a08b98
SHA114c309659f78410532e92c73518c81a8650ef829
SHA256db6f403b665aaf1bfa60d3b5cbcfaad8de92e15fb59a2053089295b2b54a0522
SHA51230f9343d9fd508910e5f45086986d694713cb6096fcf05fd3e6f01e02a50e30e5db20cd9cbf06a427e3b3741006ff9f6e5d3c01984afa127da1c2e9647704d98
-
Filesize
300KB
MD5f6a62eb330e37ee7fa42050572a08b98
SHA114c309659f78410532e92c73518c81a8650ef829
SHA256db6f403b665aaf1bfa60d3b5cbcfaad8de92e15fb59a2053089295b2b54a0522
SHA51230f9343d9fd508910e5f45086986d694713cb6096fcf05fd3e6f01e02a50e30e5db20cd9cbf06a427e3b3741006ff9f6e5d3c01984afa127da1c2e9647704d98
-
Filesize
300KB
MD5f6a62eb330e37ee7fa42050572a08b98
SHA114c309659f78410532e92c73518c81a8650ef829
SHA256db6f403b665aaf1bfa60d3b5cbcfaad8de92e15fb59a2053089295b2b54a0522
SHA51230f9343d9fd508910e5f45086986d694713cb6096fcf05fd3e6f01e02a50e30e5db20cd9cbf06a427e3b3741006ff9f6e5d3c01984afa127da1c2e9647704d98
-
Filesize
300KB
MD5f6a62eb330e37ee7fa42050572a08b98
SHA114c309659f78410532e92c73518c81a8650ef829
SHA256db6f403b665aaf1bfa60d3b5cbcfaad8de92e15fb59a2053089295b2b54a0522
SHA51230f9343d9fd508910e5f45086986d694713cb6096fcf05fd3e6f01e02a50e30e5db20cd9cbf06a427e3b3741006ff9f6e5d3c01984afa127da1c2e9647704d98
-
Filesize
300KB
MD5f6a62eb330e37ee7fa42050572a08b98
SHA114c309659f78410532e92c73518c81a8650ef829
SHA256db6f403b665aaf1bfa60d3b5cbcfaad8de92e15fb59a2053089295b2b54a0522
SHA51230f9343d9fd508910e5f45086986d694713cb6096fcf05fd3e6f01e02a50e30e5db20cd9cbf06a427e3b3741006ff9f6e5d3c01984afa127da1c2e9647704d98
-
Filesize
300KB
MD5f6a62eb330e37ee7fa42050572a08b98
SHA114c309659f78410532e92c73518c81a8650ef829
SHA256db6f403b665aaf1bfa60d3b5cbcfaad8de92e15fb59a2053089295b2b54a0522
SHA51230f9343d9fd508910e5f45086986d694713cb6096fcf05fd3e6f01e02a50e30e5db20cd9cbf06a427e3b3741006ff9f6e5d3c01984afa127da1c2e9647704d98