Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2023 00:51
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.ff49deece23d5d07c224ba981866d130.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.ff49deece23d5d07c224ba981866d130.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.ff49deece23d5d07c224ba981866d130.exe
-
Size
34KB
-
MD5
ff49deece23d5d07c224ba981866d130
-
SHA1
c5be6d23d8b944561892ebea580e616a481cb69e
-
SHA256
1c65f36c73b0fd003c64e1cb341204dce749a162ca764d4bff4d347c5da65478
-
SHA512
49ffb879dfceddbacb897eda6be7ea0a31b8c1f2661906effdeb806454e3e4b47d7442b13f73cfac82fc4c5ad13df5b37d6cf199c9d0b702540834b359fa9db2
-
SSDEEP
768:KvJprxpunVd2xIbyR3tY8g7+VwkzWnlB7iGkWCEvaR14l:K7uny3VgaVL4lB7iGkWCEv214
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1372 dw20.exe Token: SeBackupPrivilege 1372 dw20.exe Token: SeBackupPrivilege 1372 dw20.exe Token: SeBackupPrivilege 1372 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2196 wrote to memory of 1372 2196 NEAS.ff49deece23d5d07c224ba981866d130.exe 86 PID 2196 wrote to memory of 1372 2196 NEAS.ff49deece23d5d07c224ba981866d130.exe 86 PID 2196 wrote to memory of 1372 2196 NEAS.ff49deece23d5d07c224ba981866d130.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.ff49deece23d5d07c224ba981866d130.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.ff49deece23d5d07c224ba981866d130.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 9922⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1372
-