Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01-11-2023 04:35
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.24b3d4a4f75fafb99707afd13b4b4cb0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.24b3d4a4f75fafb99707afd13b4b4cb0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.24b3d4a4f75fafb99707afd13b4b4cb0.exe
-
Size
44KB
-
MD5
24b3d4a4f75fafb99707afd13b4b4cb0
-
SHA1
1dfaab602b34520351c848d721e52de730b0980d
-
SHA256
68a91e9901a3e09f15795b7f03415ab09bb107c8c2b4ef271912dee2bf418416
-
SHA512
bd2710ede7a37e9db86de8d4aec9a9d6ac1228ee9483fd9d607af95796765a9c421e7c7eca2c141307e8da6281225a9b54c7f86f3a917728f66e0b64f5d90c0a
-
SSDEEP
768:hAvJ4LSyC8aVN7yycRbelpE1uE9xiMQVI9e:2B4OyC8aVN7+elmZEIQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2700 comhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1656 NEAS.24b3d4a4f75fafb99707afd13b4b4cb0.exe 1656 NEAS.24b3d4a4f75fafb99707afd13b4b4cb0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2700 1656 NEAS.24b3d4a4f75fafb99707afd13b4b4cb0.exe 18 PID 1656 wrote to memory of 2700 1656 NEAS.24b3d4a4f75fafb99707afd13b4b4cb0.exe 18 PID 1656 wrote to memory of 2700 1656 NEAS.24b3d4a4f75fafb99707afd13b4b4cb0.exe 18 PID 1656 wrote to memory of 2700 1656 NEAS.24b3d4a4f75fafb99707afd13b4b4cb0.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.24b3d4a4f75fafb99707afd13b4b4cb0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.24b3d4a4f75fafb99707afd13b4b4cb0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\comhost.exe"C:\Users\Admin\AppData\Local\Temp\comhost.exe"2⤵
- Executes dropped EXE
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5e1156fa83905550eeb9aaec2b958d22b
SHA15f736bbfffbbe12335037dc6e86ff47e303cd6d8
SHA2561fe1e24c525f5fa60fb3f04a2db016916a69f5b94a5feaedcb72769f6dfa38b1
SHA512a6969016283d2c1bd6df9a26ecd06a6ceaa92a9c46a34b492ca913e350948b42cc2f64d3998bd572b62d7976fde07645b538eafbd13a964ca293e91701b6e284
-
Filesize
44KB
MD5e1156fa83905550eeb9aaec2b958d22b
SHA15f736bbfffbbe12335037dc6e86ff47e303cd6d8
SHA2561fe1e24c525f5fa60fb3f04a2db016916a69f5b94a5feaedcb72769f6dfa38b1
SHA512a6969016283d2c1bd6df9a26ecd06a6ceaa92a9c46a34b492ca913e350948b42cc2f64d3998bd572b62d7976fde07645b538eafbd13a964ca293e91701b6e284
-
Filesize
44KB
MD5e1156fa83905550eeb9aaec2b958d22b
SHA15f736bbfffbbe12335037dc6e86ff47e303cd6d8
SHA2561fe1e24c525f5fa60fb3f04a2db016916a69f5b94a5feaedcb72769f6dfa38b1
SHA512a6969016283d2c1bd6df9a26ecd06a6ceaa92a9c46a34b492ca913e350948b42cc2f64d3998bd572b62d7976fde07645b538eafbd13a964ca293e91701b6e284
-
Filesize
44KB
MD5e1156fa83905550eeb9aaec2b958d22b
SHA15f736bbfffbbe12335037dc6e86ff47e303cd6d8
SHA2561fe1e24c525f5fa60fb3f04a2db016916a69f5b94a5feaedcb72769f6dfa38b1
SHA512a6969016283d2c1bd6df9a26ecd06a6ceaa92a9c46a34b492ca913e350948b42cc2f64d3998bd572b62d7976fde07645b538eafbd13a964ca293e91701b6e284
-
Filesize
44KB
MD5e1156fa83905550eeb9aaec2b958d22b
SHA15f736bbfffbbe12335037dc6e86ff47e303cd6d8
SHA2561fe1e24c525f5fa60fb3f04a2db016916a69f5b94a5feaedcb72769f6dfa38b1
SHA512a6969016283d2c1bd6df9a26ecd06a6ceaa92a9c46a34b492ca913e350948b42cc2f64d3998bd572b62d7976fde07645b538eafbd13a964ca293e91701b6e284