Analysis

  • max time kernel
    151s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-11-2023 13:55

General

  • Target

    NEAS.277125b630885855110744986e4ed5c0.exe

  • Size

    29KB

  • MD5

    277125b630885855110744986e4ed5c0

  • SHA1

    24dff378d7badba05293e747db960fcb68d56c5b

  • SHA256

    7ece4db4da844c7ab0982629dc0dd1b85a920ff40fc33193529ad82430e7a766

  • SHA512

    3f382b11f065996d90f10105a02d961830fde3f36e4bb1532beca467ad34264f665d80c384773c8e0136619223179202267223f711c374c0b7fa37c083b6f45c

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/fx:AEwVs+0jNDY1qi/qh

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 29 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.277125b630885855110744986e4ed5c0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.277125b630885855110744986e4ed5c0.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:3316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\2JBMCFQZ\default7IX2U32U.htm

    Filesize

    308B

    MD5

    d633d65c70fce887db4580e12d24dda5

    SHA1

    8e37901eb72c58f96990f30fe13bb1dcb22874e8

    SHA256

    358883157b84d0634a7a4cabb66dbd4d22f57db6526a8563dfa0748b122ef76b

    SHA512

    357938278bfd73b7be94e286ee09730ffedf00be87a175e93a9bb25a8570caa79b8cbfb468c86d96d262fb31dbfba9f3b58aa134887752e8a4185f23cd2d5bae

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\2JBMCFQZ\default[1].htm

    Filesize

    304B

    MD5

    605de1f61d0446f81e63c25750e99301

    SHA1

    0eaf9121f9dc1338807a511f92ea0b30dc2982a5

    SHA256

    049f75dee036da00f8c8366d29ee14268239df75b8be53aa104aec22b84560f0

    SHA512

    a6a2505b8b89a895922ad6dc06d2ce620cb51cc6582c1b7e498a9f1ee1e4e47c53ebc4f92f8aa37532d558667225e30574732c9fe7187153a262c933893e4285

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\2JBMCFQZ\search[2].htm

    Filesize

    25B

    MD5

    8ba61a16b71609a08bfa35bc213fce49

    SHA1

    8374dddcc6b2ede14b0ea00a5870a11b57ced33f

    SHA256

    6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

    SHA512

    5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\5T0U3BIO\defaultN3J74WFA.htm

    Filesize

    312B

    MD5

    c15952329e9cd008b41f979b6c76b9a2

    SHA1

    53c58cc742b5a0273df8d01ba2779a979c1ff967

    SHA256

    5d065a88f9a1fb565c2d70e87148d469dd9dcbbefea4ccc8c181745eda748ab7

    SHA512

    6aecdd949abcd2cb54e2fe3e1171ee47c247aa3980a0847b9934f506ef9b2d3180831adf6554c68b0621f9f9f3cd88767ef9487bc6e51cecd6a8857099a7b296

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\5T0U3BIO\default[10].htm

    Filesize

    310B

    MD5

    2a8026547dafd0504845f41881ed3ab4

    SHA1

    bedb776ce5eb9d61e602562a926d0fe182d499db

    SHA256

    231fe7c979332b82ceccc3b3c0c2446bc2c3cab5c46fb7687c4bb579a8bba7ce

    SHA512

    1f6fa43fc0cf5cbdb22649a156f36914b2479a93d220bf0e23a32c086da46dd37e8f3a789e7a405abef0782e7b3151087d253c63c6cefcad10fd47c699fbcf97

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\5T0U3BIO\default[1].htm

    Filesize

    302B

    MD5

    d3732cc1a0be1c7ab6273bada74de184

    SHA1

    e6bd4f45665ce7983ebaa25b227bce5839d433cb

    SHA256

    fb396fa07f6055da52c298dd2ebbd77fbd69e21eb0e8e04097f9696e6a822292

    SHA512

    f94240dfd256c87349ee1825e03ff447b8545d3119769125aa557c4e5281a5280532dcf6b25384e104b3369bb6c897ab99eba2b8f0d774a032f85db45a7c4c0f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\5T0U3BIO\default[2].htm

    Filesize

    305B

    MD5

    2c4ce699b73ce3278646321d836aca40

    SHA1

    72ead77fbd91cfadae8914cbb4c023a618bf0bd1

    SHA256

    e7391b33aeb3be8afbe1b180430c606c5d3368baf7f458254cef5db9eef966e3

    SHA512

    89ec604cd4a4ad37c5392da0bb28bd9072d731a3efdd38707eeb7b1caf7626e6917da687529bf9426d8eb89fab23175399032d545d96ab93ffd19dd54c02c075

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\5T0U3BIO\default[4].htm

    Filesize

    303B

    MD5

    0a53779b07f9c9c56ef169499851915e

    SHA1

    281bf81610dae812be159f95a0858f88f9b96637

    SHA256

    b946117d346ecf850135aae1ac65b368f4effd806bf5180ecd3c585f1324dbd1

    SHA512

    5a5016dcdeef68be7115eafee0a6844e3cc868fa04f353980d924fca7394962d919d8dece40b15b7ddcc867f956fc8c0e522b68688ca409f1671c39e42973dc6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PR01V9ZG\defaultRXF1IG4L.htm

    Filesize

    308B

    MD5

    5243568476eb2052b2f3b67dc9053e86

    SHA1

    b126aa6506772f9024b76580bdf28b45e3a7f051

    SHA256

    2d458622dc76eb87e44cc7db89309efdf50f99821145ae86864fd1b714cbaa80

    SHA512

    3c68cef4e3daa4bca6e8b3aa5a31874be1e4dec38fe9781c6fe4890980744527d0c6818eeb519f8e6b322118e1f08302d85972fa7da4ba8be9421aabf9a77833

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PR01V9ZG\default[3].htm

    Filesize

    304B

    MD5

    4d1a10f22e8332513741877c47ac8970

    SHA1

    f68ecc13b7a71e948c6d137be985138586deb726

    SHA256

    a0dbc1b7d129cfa07a5d324fb03e41717fbdd17be3903e7e3fd7f21878dfbba4

    SHA512

    4f1e447c41f5b694bf2bff7f21a73f2bce00dfc844d3c7722ade44249d5ac4b50cf0319630b7f3fdb890bbd76528b6d0ed6b5ad98867d09cd90dcfbfd8b96860

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PR01V9ZG\default[4].htm

    Filesize

    302B

    MD5

    485828cfdc2c1efc0c51ff9b74dd34f8

    SHA1

    6f685134b031e9b2fff0eb8c7212c99bfba3719f

    SHA256

    615a15f6247f8f979b3a066801c98489018b1d137fd5d9b7bce73824acc70f06

    SHA512

    69736b9700c2f47feab282d8bf8bd6f02c9f62ecb9c02466b6cf76b1cd4b1becc70803123e73427c871c2aeb2eb64540edf95a342f78d9211ac0571e8fd1f426

  • C:\Users\Admin\AppData\Local\Temp\dvusw0miTg.log

    Filesize

    256B

    MD5

    5497a565abfa81dbed288ea925dade09

    SHA1

    e4b2c3bd071482b6508aceb2a64336adc82206a9

    SHA256

    05c3f53573dae696be903a83140b04956186f0019e84434c71495b09b8ba0715

    SHA512

    327243df72fd55b2459e41783da2c8ff83a187872e5ca7c0df8bd261e8b3b1a76318d8e222f5a2dff3915c7510b49c34e71953210be8d85bc4bef2af75a3f26b

  • C:\Users\Admin\AppData\Local\Temp\tmpDCB1.tmp

    Filesize

    29KB

    MD5

    d28fc6460ad3a91edf0aab0627deb59d

    SHA1

    99c21cc9381fe14f7d35819a9d8567ba8499498b

    SHA256

    6f69330f238db36a88183cf59191b0c6b70db543d307268425d76730b88879a5

    SHA512

    d0e72bba6383f12987bbb462b89b3cd2fcd6dfc199c9a11a2bef1e5453f3c58703f4fea1ea154093eea856de7186e5675e31de619d6b4f07146e3c42e8560051

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    288B

    MD5

    c15f28bfc80d0617088a256fafadc83b

    SHA1

    a0cd0abf744f003eb5c48173888dfdf6079e94e8

    SHA256

    9ba5a0bb2cc6300a36a45d8cbaae55bc40585aea9015560d0411ab042947a9f4

    SHA512

    56bfe49d21182a03504cc8db5b2d45ffb45280f98f8b74f6e57241b88c84e850a0c36298211c0ccdbf30f7cb7325b23ca41289201c7eb7f520f2127764b4bebe

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    288B

    MD5

    1747d97cde4f42e8e671e56bf4fc76ef

    SHA1

    eb4fa64da9b83ee08a80e52b7b4f90d938bbc91f

    SHA256

    17a5277161733732801aa610bd42cef4588aa7eb76cef8a9aebcecd831049000

    SHA512

    c3f5f9bb8bfb73da4b9c4f744608b1b258da3767be8911c7beb55d96f78042271ec822fbf296375b55b4c112faa708f2353eecbff4603bd219f8c87d80fb11d1

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/1716-421-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1716-118-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1716-322-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1716-159-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1716-277-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1716-61-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1716-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1716-223-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1716-365-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1716-13-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/3316-33-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3316-229-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3316-165-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3316-278-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3316-123-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3316-62-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3316-323-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3316-38-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3316-28-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3316-366-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3316-26-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3316-21-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3316-16-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3316-422-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3316-15-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3316-7-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB