Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/11/2023, 14:14

General

  • Target

    NEAS.8cca47382d34fca243f6481ecccf7180.exe

  • Size

    29KB

  • MD5

    8cca47382d34fca243f6481ecccf7180

  • SHA1

    b98d0118797e8f458312397feac908d8473aa595

  • SHA256

    d845501cb4677ba0129a2901bd9dcec98fbfbcc18c4c95f563f4fe0a1c392e93

  • SHA512

    ac01b928cb403c6409dd43ca8ed4916ae9a5ed2009dc21b4b6f7427832adb1bb0850ef6b0e5b94ca94664053e766aa2ad8db2a95323159cb5d3cf46c2bdcb6ae

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/vC:AEwVs+0jNDY1qi/qHC

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 27 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.8cca47382d34fca243f6481ecccf7180.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.8cca47382d34fca243f6481ecccf7180.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1524
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0CPPPCBR\default[4].htm

    Filesize

    302B

    MD5

    d3732cc1a0be1c7ab6273bada74de184

    SHA1

    e6bd4f45665ce7983ebaa25b227bce5839d433cb

    SHA256

    fb396fa07f6055da52c298dd2ebbd77fbd69e21eb0e8e04097f9696e6a822292

    SHA512

    f94240dfd256c87349ee1825e03ff447b8545d3119769125aa557c4e5281a5280532dcf6b25384e104b3369bb6c897ab99eba2b8f0d774a032f85db45a7c4c0f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0CPPPCBR\default[5].htm

    Filesize

    303B

    MD5

    6a62ed00d5950a7aa3df6d446d0beb92

    SHA1

    608da2a7b63e92b731a7beb2d990405d7a6e9611

    SHA256

    7aaaf31ea9c2999c775008a4b769336c91d87dc8f6dc0a1015bb45c61bc39fdb

    SHA512

    10a77d30bd2a5a930233e79830ac6e0a695bcfacb4e33fe9a67a7dc4b4c0ffaf3ca6ce458bf2a6714b9c590997ff816f207bee87536516a2c8e711c3c161773d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PVJSO5VT\default[1].htm

    Filesize

    304B

    MD5

    605de1f61d0446f81e63c25750e99301

    SHA1

    0eaf9121f9dc1338807a511f92ea0b30dc2982a5

    SHA256

    049f75dee036da00f8c8366d29ee14268239df75b8be53aa104aec22b84560f0

    SHA512

    a6a2505b8b89a895922ad6dc06d2ce620cb51cc6582c1b7e498a9f1ee1e4e47c53ebc4f92f8aa37532d558667225e30574732c9fe7187153a262c933893e4285

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PVJSO5VT\default[2].htm

    Filesize

    303B

    MD5

    0a53779b07f9c9c56ef169499851915e

    SHA1

    281bf81610dae812be159f95a0858f88f9b96637

    SHA256

    b946117d346ecf850135aae1ac65b368f4effd806bf5180ecd3c585f1324dbd1

    SHA512

    5a5016dcdeef68be7115eafee0a6844e3cc868fa04f353980d924fca7394962d919d8dece40b15b7ddcc867f956fc8c0e522b68688ca409f1671c39e42973dc6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PVJSO5VT\search[1].htm

    Filesize

    25B

    MD5

    8ba61a16b71609a08bfa35bc213fce49

    SHA1

    8374dddcc6b2ede14b0ea00a5870a11b57ced33f

    SHA256

    6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

    SHA512

    5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XQJAPFBD\default[3].htm

    Filesize

    305B

    MD5

    46e42f26c7218d036d9d0608bfc83bbe

    SHA1

    9d6b068eaed89ceedda9e02e59cffdbdb8eb0207

    SHA256

    5578c64b4212b92c66773c8a2734fb1bcdc9a97d809417589262a5daefa866ef

    SHA512

    4fcc58402739d520c04d65b54584c4f0267779d244a73b22a2ed3bc502ae991524a7aaf768e30fdaa7c88803270f8494195ebf7aefec51624eeaab80df47083b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XQJAPFBD\default[6].htm

    Filesize

    304B

    MD5

    4d1a10f22e8332513741877c47ac8970

    SHA1

    f68ecc13b7a71e948c6d137be985138586deb726

    SHA256

    a0dbc1b7d129cfa07a5d324fb03e41717fbdd17be3903e7e3fd7f21878dfbba4

    SHA512

    4f1e447c41f5b694bf2bff7f21a73f2bce00dfc844d3c7722ade44249d5ac4b50cf0319630b7f3fdb890bbd76528b6d0ed6b5ad98867d09cd90dcfbfd8b96860

  • C:\Users\Admin\AppData\Local\Temp\jh2kcf.log

    Filesize

    256B

    MD5

    81a6f97bae28c6f86d70018f009af4c9

    SHA1

    888e05b602f06f18d38051129113a883f263b3d0

    SHA256

    270550184508503eb6b720f37e437ca0c2d8151c449a88b1afdf275bb2173dbc

    SHA512

    fe9d32161602f0e5c8404ff78b843991830fa1286f6b16621e44657f192c3af67af59189907a3dd4364f86a8fc9730ef5c9a91fb9f7b9677f4d1ff3f4b3cf854

  • C:\Users\Admin\AppData\Local\Temp\tmpD61A.tmp

    Filesize

    29KB

    MD5

    f0398f49d77be10c092dd5001cda3bf2

    SHA1

    397b4e8e140ce32e303b768edb9cf748064d44ae

    SHA256

    fda6d9925b21ebc793c510ccdaa4415bad368cafea18888c9e2dde6ba91e39f2

    SHA512

    3f05e8de9dc031761a080ca40972e341ae8776ad209d04bbdaf42e951f33231e3e540088e6ade4e3fa320597f82c5c77f286a4f9cede9c7843738d9837f7940d

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    288B

    MD5

    fc26166e8261c8842a87b11ffc140226

    SHA1

    e68afacb8f09be6e6941cc1c9f170d77fb48fcdd

    SHA256

    e3dae80a4ddbd00f338ba6c98bedd5509ef18933907729c811791eb59e2232c7

    SHA512

    2776f513c70450a5229d23d9579085b3848192c05700563048f097cf1dff75d6d279240311cceda5f7c9c3c4224fdaf692a8a4c2c4059d8a3f042c87bad4617c

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    288B

    MD5

    3cbe9ba0ec1fc5c16fd07f32a71d5efc

    SHA1

    4d8e7155b1d308cd2e1511418b84b0a248b7701f

    SHA256

    76eab297888337bb1387a6f23769253506dda80add259f95b08900f68b18c404

    SHA512

    18e2371438dfc310e425017272ef3c6272c9f3804625348130940953df8c4a7a5c077717991b5b899691906efbc7ee117606bd0876f72f7d827a7e5ed7ae5ca9

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/1524-274-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1524-211-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1524-49-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1524-165-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1524-117-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1524-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1524-317-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1524-13-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2564-26-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2564-118-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2564-50-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2564-166-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2564-45-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2564-212-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2564-40-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2564-38-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2564-33-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2564-28-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2564-21-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2564-277-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2564-16-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2564-320-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2564-15-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2564-5-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB