Analysis
-
max time kernel
43s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 08:38
Behavioral task
behavioral1
Sample
NEAS.18201f0c550ab901e91b1b93cfb420b1.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.18201f0c550ab901e91b1b93cfb420b1.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.18201f0c550ab901e91b1b93cfb420b1.exe
-
Size
80KB
-
MD5
18201f0c550ab901e91b1b93cfb420b1
-
SHA1
cfe458ce71d91ba1c2e2ad69f6949f894cd2ec05
-
SHA256
ecfbb20fd13fdf39584351877937e72b5186a2ff462fb08c4a8aa612baeca8ae
-
SHA512
f4192f5a0cb09108178bb4573ba193acc86bf5ee8e74f5d860ff0918969e295cfcd813bb4ea02aa13e3d5f0a715570f2f70dec1767c27a7c1aeda786ecefdc2e
-
SSDEEP
768:JdSTj3dALMNyGtT4bE9XJuFbvvJ70TxLdeVRy:3STjtALMd6bE9XJuFrvJ70z+
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x00040000000006e5-3.dat aspack_v212_v242 behavioral2/files/0x00040000000006e5-5.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 3104 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" NEAS.18201f0c550ab901e91b1b93cfb420b1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" NEAS.18201f0c550ab901e91b1b93cfb420b1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE NEAS.18201f0c550ab901e91b1b93cfb420b1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4268 wrote to memory of 3104 4268 NEAS.18201f0c550ab901e91b1b93cfb420b1.exe 85 PID 4268 wrote to memory of 3104 4268 NEAS.18201f0c550ab901e91b1b93cfb420b1.exe 85 PID 4268 wrote to memory of 3104 4268 NEAS.18201f0c550ab901e91b1b93cfb420b1.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.18201f0c550ab901e91b1b93cfb420b1.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.18201f0c550ab901e91b1b93cfb420b1.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD518201f0c550ab901e91b1b93cfb420b1
SHA1cfe458ce71d91ba1c2e2ad69f6949f894cd2ec05
SHA256ecfbb20fd13fdf39584351877937e72b5186a2ff462fb08c4a8aa612baeca8ae
SHA512f4192f5a0cb09108178bb4573ba193acc86bf5ee8e74f5d860ff0918969e295cfcd813bb4ea02aa13e3d5f0a715570f2f70dec1767c27a7c1aeda786ecefdc2e
-
Filesize
80KB
MD518201f0c550ab901e91b1b93cfb420b1
SHA1cfe458ce71d91ba1c2e2ad69f6949f894cd2ec05
SHA256ecfbb20fd13fdf39584351877937e72b5186a2ff462fb08c4a8aa612baeca8ae
SHA512f4192f5a0cb09108178bb4573ba193acc86bf5ee8e74f5d860ff0918969e295cfcd813bb4ea02aa13e3d5f0a715570f2f70dec1767c27a7c1aeda786ecefdc2e