Analysis

  • max time kernel
    158s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/11/2023, 14:14

General

  • Target

    NEAS.94a5536a6f5c294ab403c6fbbdc43b60.exe

  • Size

    69KB

  • MD5

    94a5536a6f5c294ab403c6fbbdc43b60

  • SHA1

    a095c6fc503a47b30152b67b8b996118d29e7d48

  • SHA256

    df6b94cffee8b98182948733297b67e056b426088d3538672d44e473a4fcb139

  • SHA512

    89da5c9e42ce9a92870ff851501231a06244d1843fd57e20c6be842ee59e553216a907b9aa2ccebeb710a19f02812a554772bc93bb0d7b3a22ad8950fc5459b4

  • SSDEEP

    1536:IaiqH1s+kCtrA2UMT0mTFibDKa1Xohf6ntQc:p1B31bdBob2QXoAtQc

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.94a5536a6f5c294ab403c6fbbdc43b60.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.94a5536a6f5c294ab403c6fbbdc43b60.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:4912

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\xdccPrograms\7z.exe

          Filesize

          458KB

          MD5

          4b2db0f2e6b4168e89b879599e27bcd0

          SHA1

          5681b617c6383dad8309aace0aa145834e394466

          SHA256

          efe34624564c19f55426bd4ff8b16b706bf7ebaca12ffb3f9ed2cf427fbdc065

          SHA512

          5bca858208478fc65d54d15c2e9ef35fb114931af56ee53dc3700c78b321bef45c46ec15f17e9864e79410314a1eb56712a536b2906e6a8bd437fcb42efe6c1f

        • memory/4912-29-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/4912-51-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/4912-22-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/4912-25-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/4912-26-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/4912-27-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/4912-18-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/4912-33-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/4912-28-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/4912-50-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/4912-0-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/4912-54-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/4912-55-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/4912-60-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/4912-100-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB