Analysis

  • max time kernel
    202s
  • max time network
    227s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/11/2023, 14:19

General

  • Target

    NEAS.c1580e4f3b05f17809a98526a485c2f0.exe

  • Size

    93KB

  • MD5

    c1580e4f3b05f17809a98526a485c2f0

  • SHA1

    9d03e535e7053955172ceadb8838eb07fce1fdda

  • SHA256

    b6afdd6213898d727bc50e848e19c78e6d24405397a15fa13e79daeb28f85eea

  • SHA512

    393986f14ff237c1bac418b952fd24df5bae0422b4a2b7a258637c0d3c89b4dfd4bb9b5aa529feabeaf7a2deb87a7252456971830332a48306fe3cf39e87c422

  • SSDEEP

    1536:5lrsicagdzn8K2ariPOcjk+XQuPVN72NMStSvvD6ILp9c9r5iGNOvwo:5JjcF8KfCOcjk+guPVjS+vD6Ie9oYo

Score
7/10

Malware Config

Signatures

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.c1580e4f3b05f17809a98526a485c2f0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.c1580e4f3b05f17809a98526a485c2f0.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    PID:1748

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\macromd\hotmailhacker.exe

          Filesize

          74KB

          MD5

          1c4278658a1bae297139601edfe8c8f1

          SHA1

          a9c775ee1a3a5566bed2e9e2510091e192e41343

          SHA256

          0195c621e0711ad3a62d614644a0b43d600cd25d6e387ccd9c07ba7fb47c73e6

          SHA512

          35d7e71ec84a7401f0f54317b32067dea93df8d24eca31dc1b8ed13e440328e8fc226e6cfe0ca4c6f8f4218fa7a33d351b42d4c46deffbf9da1a5d76db498309

        • memory/1748-0-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/1748-4-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/1748-35-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/1748-36-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB