Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
28/10/2023, 19:54
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.567931e82e06dece266aaf3d62f947c0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.567931e82e06dece266aaf3d62f947c0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.567931e82e06dece266aaf3d62f947c0.exe
-
Size
287KB
-
MD5
567931e82e06dece266aaf3d62f947c0
-
SHA1
69bbc57db755cf0bf9bc1ff547e0e3441d62285f
-
SHA256
0bd34dcf3a2fd3769ddc31b231cbb55120c09de789ba7eefc01b4fcb3d524beb
-
SHA512
c03cc558e3ae6c06bef5ef97d1b27829910b5a9f6d76e521fd190969b559ee60eec17d26ca9aad85fb09bf7fcaadca34c19352187be5096efa08097772b7650a
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1896 Naming.exe -
Loads dropped DLL 2 IoCs
pid Process 2072 NEAS.567931e82e06dece266aaf3d62f947c0.exe 2072 NEAS.567931e82e06dece266aaf3d62f947c0.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\AutoPlay\Naming.exe NEAS.567931e82e06dece266aaf3d62f947c0.exe File opened for modification C:\Program Files\AutoPlay\Naming.exe NEAS.567931e82e06dece266aaf3d62f947c0.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2072 NEAS.567931e82e06dece266aaf3d62f947c0.exe 2072 NEAS.567931e82e06dece266aaf3d62f947c0.exe 2072 NEAS.567931e82e06dece266aaf3d62f947c0.exe 2072 NEAS.567931e82e06dece266aaf3d62f947c0.exe 1896 Naming.exe 1896 Naming.exe 1896 Naming.exe 1896 Naming.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 1896 2072 NEAS.567931e82e06dece266aaf3d62f947c0.exe 28 PID 2072 wrote to memory of 1896 2072 NEAS.567931e82e06dece266aaf3d62f947c0.exe 28 PID 2072 wrote to memory of 1896 2072 NEAS.567931e82e06dece266aaf3d62f947c0.exe 28 PID 2072 wrote to memory of 1896 2072 NEAS.567931e82e06dece266aaf3d62f947c0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.567931e82e06dece266aaf3d62f947c0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.567931e82e06dece266aaf3d62f947c0.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files\AutoPlay\Naming.exe"C:\Program Files\AutoPlay\Naming.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1896
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
287KB
MD52d5fa7368a138d93e5f2cf7d298eb338
SHA17cd5453cd9232b17fa69988168f8a6671bd60591
SHA25654e06883958934ec39511382667712492757b3ad942d5c2d56ff2e22e40d5d23
SHA512a221cb7500589aee9e095ed11eab19076c9983eceb51667d3bdd0f5527622266baf64dc39fbc8588888af888e0d56bbcc5449b4f234cd015cc4ed48ec27dbac1
-
Filesize
287KB
MD52d5fa7368a138d93e5f2cf7d298eb338
SHA17cd5453cd9232b17fa69988168f8a6671bd60591
SHA25654e06883958934ec39511382667712492757b3ad942d5c2d56ff2e22e40d5d23
SHA512a221cb7500589aee9e095ed11eab19076c9983eceb51667d3bdd0f5527622266baf64dc39fbc8588888af888e0d56bbcc5449b4f234cd015cc4ed48ec27dbac1
-
Filesize
287KB
MD52d5fa7368a138d93e5f2cf7d298eb338
SHA17cd5453cd9232b17fa69988168f8a6671bd60591
SHA25654e06883958934ec39511382667712492757b3ad942d5c2d56ff2e22e40d5d23
SHA512a221cb7500589aee9e095ed11eab19076c9983eceb51667d3bdd0f5527622266baf64dc39fbc8588888af888e0d56bbcc5449b4f234cd015cc4ed48ec27dbac1
-
Filesize
287KB
MD52d5fa7368a138d93e5f2cf7d298eb338
SHA17cd5453cd9232b17fa69988168f8a6671bd60591
SHA25654e06883958934ec39511382667712492757b3ad942d5c2d56ff2e22e40d5d23
SHA512a221cb7500589aee9e095ed11eab19076c9983eceb51667d3bdd0f5527622266baf64dc39fbc8588888af888e0d56bbcc5449b4f234cd015cc4ed48ec27dbac1