Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 08:27
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.98a23190501b22a7799b66fbd22c4c90.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.98a23190501b22a7799b66fbd22c4c90.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.98a23190501b22a7799b66fbd22c4c90.exe
-
Size
93KB
-
MD5
98a23190501b22a7799b66fbd22c4c90
-
SHA1
a4455457221c4f2beff408c5192383417f2876df
-
SHA256
25a97147bb0a551052fa718e300bbaf9bc20a04252a30f5664ac99cfe915b3f1
-
SHA512
42ac7df4fa7beb74314113cdd368fe3ad98d019ea8072c0040f780b6a1914daf628c4976abaa64976838d4837c88659a413376a0fe33826897dc2e049378a6d3
-
SSDEEP
1536:tF0AJELoJHG9qa+oa33KJJzAKWYr0v7iJSzIRXKTzRZICrWaGZh7e:tiAyLN9qa+oEGrWViJSzIR6JJrWNZE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2044 WwanSvc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" NEAS.98a23190501b22a7799b66fbd22c4c90.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2044 2564 NEAS.98a23190501b22a7799b66fbd22c4c90.exe 88 PID 2564 wrote to memory of 2044 2564 NEAS.98a23190501b22a7799b66fbd22c4c90.exe 88 PID 2564 wrote to memory of 2044 2564 NEAS.98a23190501b22a7799b66fbd22c4c90.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.98a23190501b22a7799b66fbd22c4c90.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.98a23190501b22a7799b66fbd22c4c90.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
PID:2044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD573f7f1c3fddad9e5fe2dd8e0eec3cded
SHA16ea3754b31811f3c5dfe64bd3473bdc25995a15c
SHA2564b197faecddcadca3a8fbe33006a56cdff03c70f221fd79e3d88ed5d520b254d
SHA5128051a795819a042e1c330875f5aa9ee0f056669e6fbc39070ea8e4879d19b300a55a308b6f3fcb6b72feaddd7867980dfcfa8348a6295c6b9d1495657ae1c3cb
-
Filesize
93KB
MD573f7f1c3fddad9e5fe2dd8e0eec3cded
SHA16ea3754b31811f3c5dfe64bd3473bdc25995a15c
SHA2564b197faecddcadca3a8fbe33006a56cdff03c70f221fd79e3d88ed5d520b254d
SHA5128051a795819a042e1c330875f5aa9ee0f056669e6fbc39070ea8e4879d19b300a55a308b6f3fcb6b72feaddd7867980dfcfa8348a6295c6b9d1495657ae1c3cb