Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01-11-2023 02:11
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.edf59cbdfcb26b2208966568b8bd2200.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.edf59cbdfcb26b2208966568b8bd2200.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.edf59cbdfcb26b2208966568b8bd2200.exe
-
Size
196KB
-
MD5
edf59cbdfcb26b2208966568b8bd2200
-
SHA1
6106a6cb6450aa2872b2097a2f096cca333fc955
-
SHA256
e9c57113e7dd1d509e31a53c583e2e392fa9f17701dbe20b8d85f599ea6711a4
-
SHA512
9be9d43e7c72ee60caea68a1c3cad84f89c2aa87b252aaa1c15c4a7db44c66bc8e9c11a9323becff5a918ef65d5b57072b56ad7c2ac44fdb375bb69d1e8996fb
-
SSDEEP
1536:ur3Z5IfQmv81aZKyXXZPbihOjrqLy14Gp7FtnV7pjl:yJOfQm01KKyXXZPbi8aIp7nl
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2244 attrib.exe -
Deletes itself 1 IoCs
pid Process 2712 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2796 rwmhost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Debug\rwmhost.exe NEAS.edf59cbdfcb26b2208966568b8bd2200.exe File opened for modification C:\Windows\Debug\rwmhost.exe attrib.exe File created C:\Windows\Debug\rwmhost.exe NEAS.edf59cbdfcb26b2208966568b8bd2200.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2352 NEAS.edf59cbdfcb26b2208966568b8bd2200.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2244 2352 NEAS.edf59cbdfcb26b2208966568b8bd2200.exe 28 PID 2352 wrote to memory of 2244 2352 NEAS.edf59cbdfcb26b2208966568b8bd2200.exe 28 PID 2352 wrote to memory of 2244 2352 NEAS.edf59cbdfcb26b2208966568b8bd2200.exe 28 PID 2352 wrote to memory of 2244 2352 NEAS.edf59cbdfcb26b2208966568b8bd2200.exe 28 PID 2352 wrote to memory of 2712 2352 NEAS.edf59cbdfcb26b2208966568b8bd2200.exe 31 PID 2352 wrote to memory of 2712 2352 NEAS.edf59cbdfcb26b2208966568b8bd2200.exe 31 PID 2352 wrote to memory of 2712 2352 NEAS.edf59cbdfcb26b2208966568b8bd2200.exe 31 PID 2352 wrote to memory of 2712 2352 NEAS.edf59cbdfcb26b2208966568b8bd2200.exe 31 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2244 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.edf59cbdfcb26b2208966568b8bd2200.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.edf59cbdfcb26b2208966568b8bd2200.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\rwmhost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:2244
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\NEASED~1.EXE > nul2⤵
- Deletes itself
PID:2712
-
-
C:\Windows\Debug\rwmhost.exeC:\Windows\Debug\rwmhost.exe1⤵
- Executes dropped EXE
PID:2796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD5ca0d87179c71170233880d637162a51f
SHA1ee9851b39758aae414a8aa27853b602ccf33fca0
SHA256a010895877d87ad22a554ef27a149c9d51145bb1bd2b465ab1774d9f65c28f09
SHA5125ffcad09dd9037b614047b711d2334dd800bba5624a6f9c38bf398b94a1406dfbab1c49cad3a31cc2678e4b49eda24051ef3e09d76a477d6116d439b778ca701
-
Filesize
196KB
MD5ca0d87179c71170233880d637162a51f
SHA1ee9851b39758aae414a8aa27853b602ccf33fca0
SHA256a010895877d87ad22a554ef27a149c9d51145bb1bd2b465ab1774d9f65c28f09
SHA5125ffcad09dd9037b614047b711d2334dd800bba5624a6f9c38bf398b94a1406dfbab1c49cad3a31cc2678e4b49eda24051ef3e09d76a477d6116d439b778ca701