Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-11-2023 13:57

General

  • Target

    NEAS.3a6098efe1a18a0b891c997b447a1580.exe

  • Size

    22KB

  • MD5

    3a6098efe1a18a0b891c997b447a1580

  • SHA1

    23aaf54899cc2b5c9213166981a540d1f3fa113d

  • SHA256

    002ad3fcaf6e99f2068cefd019b64a8d37c542470a8507cccd6d16c73e703e1c

  • SHA512

    b9dc8cb6b4f501320f44823d2ab4c081fd4e39ccd4bb16d7845364b9077b536543bbb699d02b94e9e6ece71594a49699a3b37e00cc3396985005258ea745dc25

  • SSDEEP

    384:ErzPOiZgWOMfoW26rOp7a5JOq98P3Rp8o0F0U8weXAkzYThgaDX1AET8S6syk7A+:ErzBRtoW24MWJOq98P33xUh4AuYTSQXn

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.3a6098efe1a18a0b891c997b447a1580.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.3a6098efe1a18a0b891c997b447a1580.exe"
    1⤵
    • Drops file in System32 directory
    PID:3000
    • C:\Windows\SysWOW64\rmass.exe
      "C:\Windows\SysWOW64\rmass.exe"
      2⤵
      • Executes dropped EXE
      PID:3560

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\rmass.exe

    Filesize

    19KB

    MD5

    33a5b0dcad6a94e95783c11964f0b68c

    SHA1

    998f57326ad1c90ced9b7b8881bae330baf40cd8

    SHA256

    43c2602a19b780b5017e11b5afb611c13582c64fed118cd6f3bc93611b178f4c

    SHA512

    dd918a87c54e9e5fb032d5a476ebc37a1909ad25db0a181707a0c71e1b76e0b5243daf396fd40b096265642b072f7d0d82627b11749379cf00831a8c5a535bd0

  • memory/3000-0-0x0000000076EE2000-0x0000000076EE3000-memory.dmp

    Filesize

    4KB

  • memory/3000-5-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/3560-4-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3560-6-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB