Analysis
-
max time kernel
13s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
31/10/2023, 15:27
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe
-
Size
266KB
-
MD5
d2b62dfadc3da1a9439a7bd954e56600
-
SHA1
45302dfc530052b3e4e2a8f532c9b0b65152e7d3
-
SHA256
e5935c8a1fe8d5d5337b6948fd5ad516a415b723c10c1194a55bd73a7cf3b490
-
SHA512
8f87b32487146a85f302b27cfbf53932a5b24d9452daf28e02b790aa75c28f6aa5538e72786e0dede15c1841194f8a98e9bb3059a15c234d5b94cd03fceddb44
-
SSDEEP
3072:WcX93xwq19gL2SjGojCJa79TBfsY5vXWqvuHcYnLzqP2i:WcNhJgX9z9TB0YRX8n8
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1264 MSWDM.EXE 2796 MSWDM.EXE 3064 NEAS.D2B62DFADC3DA1A9439A7BD954E56600_JC.EXE 2632 MSWDM.EXE -
Loads dropped DLL 2 IoCs
pid Process 2796 MSWDM.EXE 2796 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe File opened for modification C:\Windows\dev3E86.tmp NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe File opened for modification C:\Windows\dev3E86.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2796 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1828 wrote to memory of 1264 1828 NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe 28 PID 1828 wrote to memory of 1264 1828 NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe 28 PID 1828 wrote to memory of 1264 1828 NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe 28 PID 1828 wrote to memory of 1264 1828 NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe 28 PID 1828 wrote to memory of 2796 1828 NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe 29 PID 1828 wrote to memory of 2796 1828 NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe 29 PID 1828 wrote to memory of 2796 1828 NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe 29 PID 1828 wrote to memory of 2796 1828 NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe 29 PID 2796 wrote to memory of 3064 2796 MSWDM.EXE 30 PID 2796 wrote to memory of 3064 2796 MSWDM.EXE 30 PID 2796 wrote to memory of 3064 2796 MSWDM.EXE 30 PID 2796 wrote to memory of 3064 2796 MSWDM.EXE 30 PID 2796 wrote to memory of 2632 2796 MSWDM.EXE 31 PID 2796 wrote to memory of 2632 2796 MSWDM.EXE 31 PID 2796 wrote to memory of 2632 2796 MSWDM.EXE 31 PID 2796 wrote to memory of 2632 2796 MSWDM.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1264
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev3E86.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.d2b62dfadc3da1a9439a7bd954e56600_JC.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\NEAS.D2B62DFADC3DA1A9439A7BD954E56600_JC.EXE
- Executes dropped EXE
PID:3064
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev3E86.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.D2B62DFADC3DA1A9439A7BD954E56600_JC.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2632
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266KB
MD578dddc82ce37608599c102c28dbbeb41
SHA17e008e0c1135631b2c37528fe9a82dea10b473dc
SHA2565bb5894260dbb11d15aa80d53931df91314bb53e805cc0b4160eb7161c79b499
SHA512704f783254bcadab8f369e10700adfa89f81d14a89753e1a1ef2a079be8313ace3879c0c336d8151c771b0ca89a69728e78659bebd69bde2a22750623d1a4f76
-
Filesize
266KB
MD578dddc82ce37608599c102c28dbbeb41
SHA17e008e0c1135631b2c37528fe9a82dea10b473dc
SHA2565bb5894260dbb11d15aa80d53931df91314bb53e805cc0b4160eb7161c79b499
SHA512704f783254bcadab8f369e10700adfa89f81d14a89753e1a1ef2a079be8313ace3879c0c336d8151c771b0ca89a69728e78659bebd69bde2a22750623d1a4f76
-
Filesize
10KB
MD5bf2411bc726873efb646f8b47f3e4efe
SHA1225a0b4dc3a79bfaf8496a3185026b0a5340ea6b
SHA256972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd
SHA512fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2
-
Filesize
10KB
MD5bf2411bc726873efb646f8b47f3e4efe
SHA1225a0b4dc3a79bfaf8496a3185026b0a5340ea6b
SHA256972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd
SHA512fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
10KB
MD5bf2411bc726873efb646f8b47f3e4efe
SHA1225a0b4dc3a79bfaf8496a3185026b0a5340ea6b
SHA256972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd
SHA512fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2
-
Filesize
10KB
MD5bf2411bc726873efb646f8b47f3e4efe
SHA1225a0b4dc3a79bfaf8496a3185026b0a5340ea6b
SHA256972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd
SHA512fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2
-
Filesize
10KB
MD5bf2411bc726873efb646f8b47f3e4efe
SHA1225a0b4dc3a79bfaf8496a3185026b0a5340ea6b
SHA256972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd
SHA512fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2