Analysis

  • max time kernel
    164s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/11/2023, 13:55

General

  • Target

    NEAS.29c7c2db7166030e1da23ab3eded6680.exe

  • Size

    6.2MB

  • MD5

    29c7c2db7166030e1da23ab3eded6680

  • SHA1

    b6c3ee9a6f06aad00625805daccf95e019a9ed04

  • SHA256

    4aaa4f193565bf5c998daf1e1b52c7a61796363fb922b740cf40072f5ca4b971

  • SHA512

    46a3cc4876bc907c6449f343b50f987f0c4039caa76510e4239b03d73bf35d4a8093c963cd48a9ba479ce8488cded32da60683f9cacade8b5f803b00502c21cd

  • SSDEEP

    196608:drF4MD1btilf1Z1j7SILzTeAjdIcvK7gsD7YLA:d1Mlf9LzTOMsPYs

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.29c7c2db7166030e1da23ab3eded6680.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.29c7c2db7166030e1da23ab3eded6680.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:1980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCX702.tmp

    Filesize

    66KB

    MD5

    57f9a042d19cfd5a1e44971ab340b33e

    SHA1

    39e14f006dd2bc16ec59993167196380568bbdfd

    SHA256

    49fe92f2faf7bad9e0b52cf406c8ee12dd8c77d1a89d485b15897e2d56ea8b32

    SHA512

    d2b265c12289c3768550d99ed527da3465926407d9179ea7768e62aac93745334a7fcbde6d822ef80a2ee6d50d72f893b15c51870ef30c8d5125dd970a8973a4

  • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

    Filesize

    6.2MB

    MD5

    29c7c2db7166030e1da23ab3eded6680

    SHA1

    b6c3ee9a6f06aad00625805daccf95e019a9ed04

    SHA256

    4aaa4f193565bf5c998daf1e1b52c7a61796363fb922b740cf40072f5ca4b971

    SHA512

    46a3cc4876bc907c6449f343b50f987f0c4039caa76510e4239b03d73bf35d4a8093c963cd48a9ba479ce8488cded32da60683f9cacade8b5f803b00502c21cd

  • memory/1980-97-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1980-98-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1980-93-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1980-94-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1980-95-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1980-96-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1980-91-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1980-92-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1980-99-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1980-100-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1980-101-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1980-102-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1980-103-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1980-104-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1980-105-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB