Analysis
-
max time kernel
198s -
max time network
217s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2023, 19:54
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.567931e82e06dece266aaf3d62f947c0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.567931e82e06dece266aaf3d62f947c0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.567931e82e06dece266aaf3d62f947c0.exe
-
Size
287KB
-
MD5
567931e82e06dece266aaf3d62f947c0
-
SHA1
69bbc57db755cf0bf9bc1ff547e0e3441d62285f
-
SHA256
0bd34dcf3a2fd3769ddc31b231cbb55120c09de789ba7eefc01b4fcb3d524beb
-
SHA512
c03cc558e3ae6c06bef5ef97d1b27829910b5a9f6d76e521fd190969b559ee60eec17d26ca9aad85fb09bf7fcaadca34c19352187be5096efa08097772b7650a
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1268 upgraded..exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\MessageBox\upgraded..exe NEAS.567931e82e06dece266aaf3d62f947c0.exe File opened for modification C:\Program Files\MessageBox\upgraded..exe NEAS.567931e82e06dece266aaf3d62f947c0.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4932 NEAS.567931e82e06dece266aaf3d62f947c0.exe 4932 NEAS.567931e82e06dece266aaf3d62f947c0.exe 4932 NEAS.567931e82e06dece266aaf3d62f947c0.exe 4932 NEAS.567931e82e06dece266aaf3d62f947c0.exe 1268 upgraded..exe 1268 upgraded..exe 1268 upgraded..exe 1268 upgraded..exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4932 wrote to memory of 1268 4932 NEAS.567931e82e06dece266aaf3d62f947c0.exe 89 PID 4932 wrote to memory of 1268 4932 NEAS.567931e82e06dece266aaf3d62f947c0.exe 89 PID 4932 wrote to memory of 1268 4932 NEAS.567931e82e06dece266aaf3d62f947c0.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.567931e82e06dece266aaf3d62f947c0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.567931e82e06dece266aaf3d62f947c0.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Program Files\MessageBox\upgraded..exe"C:\Program Files\MessageBox\upgraded..exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1268
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
287KB
MD5795f053cb55ffc86f27ed25b4ad6404e
SHA165a41ae548bf0b61cd79cbddd2e817107d6fae62
SHA2569f855c99dd3349016c9371bad68fe725304d8a3aaa70b65006962aa549b831c8
SHA5120c2a5ed03a9e1d0b2c11aaf87d544af6d50959bda168d932ea9df0d0823cdfbe8a420286c459780c33d3310fe3f97bbbc0b3ecf77d62e04bf66f3121f83a54dd
-
Filesize
287KB
MD5795f053cb55ffc86f27ed25b4ad6404e
SHA165a41ae548bf0b61cd79cbddd2e817107d6fae62
SHA2569f855c99dd3349016c9371bad68fe725304d8a3aaa70b65006962aa549b831c8
SHA5120c2a5ed03a9e1d0b2c11aaf87d544af6d50959bda168d932ea9df0d0823cdfbe8a420286c459780c33d3310fe3f97bbbc0b3ecf77d62e04bf66f3121f83a54dd