Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
31-10-2023 09:00
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.e6aebf6eb4ff626ad0a2ecb7f7146c00.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.e6aebf6eb4ff626ad0a2ecb7f7146c00.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.e6aebf6eb4ff626ad0a2ecb7f7146c00.exe
-
Size
123KB
-
MD5
e6aebf6eb4ff626ad0a2ecb7f7146c00
-
SHA1
fef50f36aa3c8b6bda0604f7a51b33d6d6d0daf7
-
SHA256
f15b8a71f8f4c2281fc5a3adc44ba2920fb6ee2194165521c4f367cac9ef653e
-
SHA512
fadf556013a3fd50cf5c538716cf1d3250542992be4075f2f8e1ba1dd5fb5ad9b0ffb9f48c8f434286de1ef15fb5a70a1e50934a64aa8aef41d0e9a18f6efb2f
-
SSDEEP
3072:PfU/WF6QMauSuiWNi9CO+WARJrWNZIYvQd2b:AWKauSuiWNiUBRJrW7fb
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2740 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1896 wuauclt.exe -
Loads dropped DLL 1 IoCs
pid Process 2628 NEAS.e6aebf6eb4ff626ad0a2ecb7f7146c00.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\wuauclt.exe\" /run" NEAS.e6aebf6eb4ff626ad0a2ecb7f7146c00.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2628 wrote to memory of 1896 2628 NEAS.e6aebf6eb4ff626ad0a2ecb7f7146c00.exe 28 PID 2628 wrote to memory of 1896 2628 NEAS.e6aebf6eb4ff626ad0a2ecb7f7146c00.exe 28 PID 2628 wrote to memory of 1896 2628 NEAS.e6aebf6eb4ff626ad0a2ecb7f7146c00.exe 28 PID 2628 wrote to memory of 1896 2628 NEAS.e6aebf6eb4ff626ad0a2ecb7f7146c00.exe 28 PID 2628 wrote to memory of 2740 2628 NEAS.e6aebf6eb4ff626ad0a2ecb7f7146c00.exe 29 PID 2628 wrote to memory of 2740 2628 NEAS.e6aebf6eb4ff626ad0a2ecb7f7146c00.exe 29 PID 2628 wrote to memory of 2740 2628 NEAS.e6aebf6eb4ff626ad0a2ecb7f7146c00.exe 29 PID 2628 wrote to memory of 2740 2628 NEAS.e6aebf6eb4ff626ad0a2ecb7f7146c00.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.e6aebf6eb4ff626ad0a2ecb7f7146c00.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e6aebf6eb4ff626ad0a2ecb7f7146c00.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\ProgramData\Update\wuauclt.exe"C:\ProgramData\Update\wuauclt.exe" /run2⤵
- Executes dropped EXE
PID:1896
-
-
C:\windows\SysWOW64\cmd.exe"C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\NEAS.e6aebf6eb4ff626ad0a2ecb7f7146c00.exe" >> NUL2⤵
- Deletes itself
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD58611946dc483a4a0298fac90ea98937c
SHA1a7273f4b3743a1c087f80932c25cbc1e50d96bbc
SHA256e85e64f30b85f80cc33be2fda7b6d8805e5a066187e55a654fbc04a0b9a79c2b
SHA51299e9cc05e1089485deaa3ec1b11db98e38d40edd2ecfccb7df87a1d647b79ca8269c4a36fa51cd61179e0f14d86e4e6019ea382449d38f3c14593bb090a9e8d7
-
Filesize
123KB
MD58611946dc483a4a0298fac90ea98937c
SHA1a7273f4b3743a1c087f80932c25cbc1e50d96bbc
SHA256e85e64f30b85f80cc33be2fda7b6d8805e5a066187e55a654fbc04a0b9a79c2b
SHA51299e9cc05e1089485deaa3ec1b11db98e38d40edd2ecfccb7df87a1d647b79ca8269c4a36fa51cd61179e0f14d86e4e6019ea382449d38f3c14593bb090a9e8d7