Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/10/2023, 08:40

General

  • Target

    NEAS.e6799ba673932fb8f8c5748effc0f75b.exe

  • Size

    3.0MB

  • MD5

    e6799ba673932fb8f8c5748effc0f75b

  • SHA1

    90d0f7e4ab6f4914f661425f4a62f5bb9de713ac

  • SHA256

    952453b000a9b232f660fcb9b84b6e9832e0aba5fc8f4a33fd5032654beb58ce

  • SHA512

    963e6ca061fcb3d9179ac03f782c5eb5fe13135cf2af771bc252d39ffd12b7e5674563891eb78d5ed0e6fdf1fc43b6d42c8676d9c42051b76a1626e4d2985c2b

  • SSDEEP

    49152:pZINO9Wp5UON4jvCh90mLI5TbMtjmUL0kpj7bmZfUQmcZY6sKsir3sdj8PjhROXN:v5y3KDI9pKALo5UnENsKsiQ6NJs

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.e6799ba673932fb8f8c5748effc0f75b.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.e6799ba673932fb8f8c5748effc0f75b.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:416

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

          Filesize

          3.1MB

          MD5

          8f9edb00cab08da34782ed7bf614ec0b

          SHA1

          2ccefe10f1ea23736c7cfbab1b9a7f61155114e3

          SHA256

          42f91bf65c805e43eddf8bf9c0cad10acd936ecfaae72e2aaa918f4c9f136739

          SHA512

          e1a4fbb8adc4be194797208a36d56ee9d2e69486c6b76c9d879d5b8d1420b8517b60dc361701b9198e565495cb558ffda871bce65b854e6d46b19f1225638fff

        • memory/416-20-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/416-111-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/416-112-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/416-113-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/416-114-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/416-115-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/416-116-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/416-117-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/416-118-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/416-119-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/416-120-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/416-121-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/416-122-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/416-123-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB