Analysis

  • max time kernel
    23s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/11/2023, 00:40

General

  • Target

    NEAS.f4c41b2d9ce1dabf06ad42cfb299caf0.exe

  • Size

    271KB

  • MD5

    f4c41b2d9ce1dabf06ad42cfb299caf0

  • SHA1

    c32b0906147496d9a3c0e821940321a148403591

  • SHA256

    acf60049e2c30895462b4257f53f9065105de14b4e1d276336155ceecc285955

  • SHA512

    795da8aeb6c92bb037ddd177f7b5df949de68223b91573fc0dc17b67a9c815ca828e1528abd81a3358af8fd0fcb2927150fab45363b65ce988edc006028103de

  • SSDEEP

    3072:WcX93xwq19gL2SjGojCJa79TBfsY5vXWqvuHcYnLzqP2ComCP1t:WcNhJgX9z9TB0YRX8nUVC9t

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.f4c41b2d9ce1dabf06ad42cfb299caf0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.f4c41b2d9ce1dabf06ad42cfb299caf0.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4740
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2240
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev142F.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.f4c41b2d9ce1dabf06ad42cfb299caf0.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1364
      • C:\Users\Admin\AppData\Local\Temp\NEAS.F4C41B2D9CE1DABF06AD42CFB299CAF0.EXE
        3⤵
        • Executes dropped EXE
        PID:1120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\NEAS.f4c41b2d9ce1dabf06ad42cfb299caf0.exe

    Filesize

    15KB

    MD5

    b0cec9f342bf95700b602ee376446577

    SHA1

    b955b1b64280bb0ea873538029cf5ea44081501b

    SHA256

    24a2472e3bd5016cb22ce14cefee112d5bc18354bf099e8e66ad9846aea15088

    SHA512

    05ebecfc8d3e2e7885d3cacc65bfd97db710c2cbc0fb76b19b7d6cc82b327b25df953a20affc8d84002167dd8ac7710622279d3579c6605e742a98fe7095aa4e

  • C:\WINDOWS\MSWDM.EXE

    Filesize

    256KB

    MD5

    8a1198209520897514a2d82a912a66d2

    SHA1

    5dda8ec47f948814d808cd71e89ebe65940a1ff7

    SHA256

    5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

    SHA512

    9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

  • C:\Windows\MSWDM.EXE

    Filesize

    256KB

    MD5

    8a1198209520897514a2d82a912a66d2

    SHA1

    5dda8ec47f948814d808cd71e89ebe65940a1ff7

    SHA256

    5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

    SHA512

    9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

  • C:\Windows\MSWDM.EXE

    Filesize

    256KB

    MD5

    8a1198209520897514a2d82a912a66d2

    SHA1

    5dda8ec47f948814d808cd71e89ebe65940a1ff7

    SHA256

    5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

    SHA512

    9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

  • C:\Windows\dev142F.tmp

    Filesize

    15KB

    MD5

    b0cec9f342bf95700b602ee376446577

    SHA1

    b955b1b64280bb0ea873538029cf5ea44081501b

    SHA256

    24a2472e3bd5016cb22ce14cefee112d5bc18354bf099e8e66ad9846aea15088

    SHA512

    05ebecfc8d3e2e7885d3cacc65bfd97db710c2cbc0fb76b19b7d6cc82b327b25df953a20affc8d84002167dd8ac7710622279d3579c6605e742a98fe7095aa4e