Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
31-10-2023 08:51
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.1fde17f44dbb12ac57886d26ad5eabc0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.1fde17f44dbb12ac57886d26ad5eabc0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.1fde17f44dbb12ac57886d26ad5eabc0.exe
-
Size
42KB
-
MD5
1fde17f44dbb12ac57886d26ad5eabc0
-
SHA1
f1575087492325853e957e9abecea68f889f92a1
-
SHA256
52db7f9e29cd8d47d11bfd67d30069311ea8b8a38004f942376277425e81fa27
-
SHA512
10c861bb346a323e88d444f3e620a61b79f4069ed3e7ef3b98fa969ca88ff3cbbcbd4869505797bc6aee352336047fa0b80f60c929cf70b9f6a9134a0718c7c9
-
SSDEEP
768:bIDOw9UiaCHfjnE0Sf88AvvP1oghYvm9/6D8jnPxBFH:bIDOw9a0Dwo3P1ojvUSD4PXFH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1612 lossy.exe -
Loads dropped DLL 1 IoCs
pid Process 2044 NEAS.1fde17f44dbb12ac57886d26ad5eabc0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1612 2044 NEAS.1fde17f44dbb12ac57886d26ad5eabc0.exe 28 PID 2044 wrote to memory of 1612 2044 NEAS.1fde17f44dbb12ac57886d26ad5eabc0.exe 28 PID 2044 wrote to memory of 1612 2044 NEAS.1fde17f44dbb12ac57886d26ad5eabc0.exe 28 PID 2044 wrote to memory of 1612 2044 NEAS.1fde17f44dbb12ac57886d26ad5eabc0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.1fde17f44dbb12ac57886d26ad5eabc0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.1fde17f44dbb12ac57886d26ad5eabc0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:1612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD59cef4d413ae845ed6bedf3813ae707c8
SHA1c5b406977f485cfea5775eb1afbe3f03c083ab6d
SHA256cdd18e0f330f5fa8e14f9095d61c22722fe1fc86f314135770e28798847e5069
SHA51203259ff7c64c9392add7d10fdb24a11075b62af5030dd9c5b4c443ba329a77a27851e9293d92dc998eafc001376bc0331db77d3cbd46629ee165dee3a7930184
-
Filesize
42KB
MD59cef4d413ae845ed6bedf3813ae707c8
SHA1c5b406977f485cfea5775eb1afbe3f03c083ab6d
SHA256cdd18e0f330f5fa8e14f9095d61c22722fe1fc86f314135770e28798847e5069
SHA51203259ff7c64c9392add7d10fdb24a11075b62af5030dd9c5b4c443ba329a77a27851e9293d92dc998eafc001376bc0331db77d3cbd46629ee165dee3a7930184
-
Filesize
42KB
MD59cef4d413ae845ed6bedf3813ae707c8
SHA1c5b406977f485cfea5775eb1afbe3f03c083ab6d
SHA256cdd18e0f330f5fa8e14f9095d61c22722fe1fc86f314135770e28798847e5069
SHA51203259ff7c64c9392add7d10fdb24a11075b62af5030dd9c5b4c443ba329a77a27851e9293d92dc998eafc001376bc0331db77d3cbd46629ee165dee3a7930184