Analysis
-
max time kernel
23s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 00:40
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f4c41b2d9ce1dabf06ad42cfb299caf0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.f4c41b2d9ce1dabf06ad42cfb299caf0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.f4c41b2d9ce1dabf06ad42cfb299caf0.exe
-
Size
271KB
-
MD5
f4c41b2d9ce1dabf06ad42cfb299caf0
-
SHA1
c32b0906147496d9a3c0e821940321a148403591
-
SHA256
acf60049e2c30895462b4257f53f9065105de14b4e1d276336155ceecc285955
-
SHA512
795da8aeb6c92bb037ddd177f7b5df949de68223b91573fc0dc17b67a9c815ca828e1528abd81a3358af8fd0fcb2927150fab45363b65ce988edc006028103de
-
SSDEEP
3072:WcX93xwq19gL2SjGojCJa79TBfsY5vXWqvuHcYnLzqP2ComCP1t:WcNhJgX9z9TB0YRX8nUVC9t
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2240 MSWDM.EXE 1364 MSWDM.EXE 1120 NEAS.F4C41B2D9CE1DABF06AD42CFB299CAF0.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" NEAS.f4c41b2d9ce1dabf06ad42cfb299caf0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" NEAS.f4c41b2d9ce1dabf06ad42cfb299caf0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE NEAS.f4c41b2d9ce1dabf06ad42cfb299caf0.exe File opened for modification C:\Windows\dev142F.tmp NEAS.f4c41b2d9ce1dabf06ad42cfb299caf0.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1364 MSWDM.EXE 1364 MSWDM.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4740 wrote to memory of 2240 4740 NEAS.f4c41b2d9ce1dabf06ad42cfb299caf0.exe 84 PID 4740 wrote to memory of 2240 4740 NEAS.f4c41b2d9ce1dabf06ad42cfb299caf0.exe 84 PID 4740 wrote to memory of 2240 4740 NEAS.f4c41b2d9ce1dabf06ad42cfb299caf0.exe 84 PID 4740 wrote to memory of 1364 4740 NEAS.f4c41b2d9ce1dabf06ad42cfb299caf0.exe 85 PID 4740 wrote to memory of 1364 4740 NEAS.f4c41b2d9ce1dabf06ad42cfb299caf0.exe 85 PID 4740 wrote to memory of 1364 4740 NEAS.f4c41b2d9ce1dabf06ad42cfb299caf0.exe 85 PID 1364 wrote to memory of 1120 1364 MSWDM.EXE 86 PID 1364 wrote to memory of 1120 1364 MSWDM.EXE 86 PID 1364 wrote to memory of 1120 1364 MSWDM.EXE 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f4c41b2d9ce1dabf06ad42cfb299caf0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f4c41b2d9ce1dabf06ad42cfb299caf0.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2240
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev142F.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.f4c41b2d9ce1dabf06ad42cfb299caf0.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\NEAS.F4C41B2D9CE1DABF06AD42CFB299CAF0.EXE
- Executes dropped EXE
PID:1120
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5b0cec9f342bf95700b602ee376446577
SHA1b955b1b64280bb0ea873538029cf5ea44081501b
SHA25624a2472e3bd5016cb22ce14cefee112d5bc18354bf099e8e66ad9846aea15088
SHA51205ebecfc8d3e2e7885d3cacc65bfd97db710c2cbc0fb76b19b7d6cc82b327b25df953a20affc8d84002167dd8ac7710622279d3579c6605e742a98fe7095aa4e
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
15KB
MD5b0cec9f342bf95700b602ee376446577
SHA1b955b1b64280bb0ea873538029cf5ea44081501b
SHA25624a2472e3bd5016cb22ce14cefee112d5bc18354bf099e8e66ad9846aea15088
SHA51205ebecfc8d3e2e7885d3cacc65bfd97db710c2cbc0fb76b19b7d6cc82b327b25df953a20affc8d84002167dd8ac7710622279d3579c6605e742a98fe7095aa4e