Analysis

  • max time kernel
    154s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/10/2023, 20:13

General

  • Target

    NEAS.c4a17408ae411360cfafa99211564090.exe

  • Size

    29KB

  • MD5

    c4a17408ae411360cfafa99211564090

  • SHA1

    e405bb1b98ef4801441bab91c39030560e270394

  • SHA256

    5752b6148ebd270b8fae7196089bc2d245a5f4b1fa5925e6cfe45fb2aa211cb2

  • SHA512

    8a455461b9b662a6653fc7012b9f9415aa0b80dd9af5108b0c1b81c2974c5d66a2715957cff0c827f9502a0e5fa8a9a5fad538c2ad35779e504af3140a462094

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/5S:AEwVs+0jNDY1qi/q8

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 26 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.c4a17408ae411360cfafa99211564090.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.c4a17408ae411360cfafa99211564090.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1384
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:400

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\K1QHLR0H\default[1].htm

          Filesize

          302B

          MD5

          51b86971925c7d24d895ff89fdebc8f5

          SHA1

          d037148e50a77f0de8421e0ef81f87f9f73570da

          SHA256

          3b50a39db6499f5cb2d3b6cec01daa5c33fcf80c0722707c6014e23ed1577280

          SHA512

          1bc88174ee963971ca43e106828d9e74473cf1aa664f6d4fa43ec9631610ab4c1dc9a0c84f5c89dd2b627eaf64f57dee99eca84b88eb14c36bf7285cb9d7f0c4

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\K1QHLR0H\default[2].htm

          Filesize

          305B

          MD5

          2c4ce699b73ce3278646321d836aca40

          SHA1

          72ead77fbd91cfadae8914cbb4c023a618bf0bd1

          SHA256

          e7391b33aeb3be8afbe1b180430c606c5d3368baf7f458254cef5db9eef966e3

          SHA512

          89ec604cd4a4ad37c5392da0bb28bd9072d731a3efdd38707eeb7b1caf7626e6917da687529bf9426d8eb89fab23175399032d545d96ab93ffd19dd54c02c075

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\K1QHLR0H\default[3].htm

          Filesize

          304B

          MD5

          4d1a10f22e8332513741877c47ac8970

          SHA1

          f68ecc13b7a71e948c6d137be985138586deb726

          SHA256

          a0dbc1b7d129cfa07a5d324fb03e41717fbdd17be3903e7e3fd7f21878dfbba4

          SHA512

          4f1e447c41f5b694bf2bff7f21a73f2bce00dfc844d3c7722ade44249d5ac4b50cf0319630b7f3fdb890bbd76528b6d0ed6b5ad98867d09cd90dcfbfd8b96860

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UDS0USIU\search[3].htm

          Filesize

          25B

          MD5

          8ba61a16b71609a08bfa35bc213fce49

          SHA1

          8374dddcc6b2ede14b0ea00a5870a11b57ced33f

          SHA256

          6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

          SHA512

          5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\W5A2S7N8\default[7].htm

          Filesize

          304B

          MD5

          605de1f61d0446f81e63c25750e99301

          SHA1

          0eaf9121f9dc1338807a511f92ea0b30dc2982a5

          SHA256

          049f75dee036da00f8c8366d29ee14268239df75b8be53aa104aec22b84560f0

          SHA512

          a6a2505b8b89a895922ad6dc06d2ce620cb51cc6582c1b7e498a9f1ee1e4e47c53ebc4f92f8aa37532d558667225e30574732c9fe7187153a262c933893e4285

        • C:\Users\Admin\AppData\Local\Temp\lsh2p.log

          Filesize

          256B

          MD5

          16f3ea1d179349465368b967cc0e1754

          SHA1

          94c769fe0cf3e11fb855a1fd5eaa48126f5d4cc5

          SHA256

          a075b0849f9e61c01fb571fe4f3ce50df42fa3c2672aa5964e789f7c300c0ca7

          SHA512

          db535b860e8eac3528a4706788e6378322e139abf2243b298fa479b42ad0097b0982477966449904a8e05a4124303a4684bd182d23705de96e0fd760d1cc71dd

        • C:\Users\Admin\AppData\Local\Temp\tmp5442.tmp

          Filesize

          29KB

          MD5

          7df772aa368a9483d391b718069edf57

          SHA1

          e2d5213c78962ea4e197a94a37d3ee9494137347

          SHA256

          7de4e03c4a226c30ffa1474ebe5a4566cefd0c663b19d975593de752716d2a91

          SHA512

          3bcfaf13b9157969e36ca8fc32b4c9f7dfbeba877cbe288c2479edefd4846ae46bdc3e8e99eee82e324e647b6f031a429d36e975536addb35b45a8f3432f3536

        • C:\Users\Admin\AppData\Local\Temp\zincite.log

          Filesize

          288B

          MD5

          8a8d5e38e7cc5aff44964485a330e38d

          SHA1

          a74fac7dd1d67613bb78e1dcbd93f3d7b290de79

          SHA256

          5cb67d58c921d034421e08f858d2a6d35e94693143aa4e4009d8fddca5de791f

          SHA512

          f043adb5af8b7e7c06aedea96be40324913ad5ee9139e9dbe61cf739abc607e4138cceea9c9b6f9224dea2f787710d2a2646bb93492ca9fab2af0afa2d7a3b8c

        • C:\Windows\services.exe

          Filesize

          8KB

          MD5

          b0fe74719b1b647e2056641931907f4a

          SHA1

          e858c206d2d1542a79936cb00d85da853bfc95e2

          SHA256

          bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

          SHA512

          9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

        • C:\Windows\services.exe

          Filesize

          8KB

          MD5

          b0fe74719b1b647e2056641931907f4a

          SHA1

          e858c206d2d1542a79936cb00d85da853bfc95e2

          SHA256

          bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

          SHA512

          9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

        • memory/400-50-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/400-21-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/400-40-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/400-33-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/400-45-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/400-5-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/400-52-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/400-188-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/400-57-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/400-28-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/400-26-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/400-38-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/400-16-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/400-112-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/400-15-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/400-141-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/1384-136-0x0000000000500000-0x0000000000510200-memory.dmp

          Filesize

          64KB

        • memory/1384-185-0x0000000000500000-0x0000000000510200-memory.dmp

          Filesize

          64KB

        • memory/1384-106-0x0000000000500000-0x0000000000510200-memory.dmp

          Filesize

          64KB

        • memory/1384-56-0x0000000000500000-0x0000000000510200-memory.dmp

          Filesize

          64KB

        • memory/1384-13-0x0000000000500000-0x0000000000510200-memory.dmp

          Filesize

          64KB

        • memory/1384-0-0x0000000000500000-0x0000000000510200-memory.dmp

          Filesize

          64KB

        • memory/1384-242-0x0000000000500000-0x0000000000510200-memory.dmp

          Filesize

          64KB