Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    01/11/2023, 13:52

General

  • Target

    NEAS.0d553fc100efa8ee7c5e200f06b289c0.exe

  • Size

    33KB

  • MD5

    0d553fc100efa8ee7c5e200f06b289c0

  • SHA1

    8771c1d2c1f727ae2a621c2d9a663f5fb85b907b

  • SHA256

    d80dd701e37501c4935cd2f5b5693effb5b620df7704af02f903169d14cf228b

  • SHA512

    de1054c7bdc37a78df992b7df7962e2bf056a51067aed55f6343eb26339af7c1a43f5a9a7a61de4a80904bed0f525b57b0e4c4b27ffee52c1408a03d195ee9eb

  • SSDEEP

    768:SCIqdH/k1ZVcT194jp46Yi/kQPFVrjQaWkK2rZ:SNqaLV8a66YNYZQLk1rZ

Score
7/10

Malware Config

Signatures

  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.0d553fc100efa8ee7c5e200f06b289c0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.0d553fc100efa8ee7c5e200f06b289c0.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:1936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Common Files\Microsoft Shared\Harry Potter.ShareReactor.com

    Filesize

    33KB

    MD5

    0d553fc100efa8ee7c5e200f06b289c0

    SHA1

    8771c1d2c1f727ae2a621c2d9a663f5fb85b907b

    SHA256

    d80dd701e37501c4935cd2f5b5693effb5b620df7704af02f903169d14cf228b

    SHA512

    de1054c7bdc37a78df992b7df7962e2bf056a51067aed55f6343eb26339af7c1a43f5a9a7a61de4a80904bed0f525b57b0e4c4b27ffee52c1408a03d195ee9eb

  • memory/1936-150-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/1936-5-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/1936-7-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/1936-3-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/1936-119-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/1936-0-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/1936-151-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/1936-152-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/1936-174-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/1936-175-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/1936-176-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/1936-178-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/1936-179-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB