Analysis

  • max time kernel
    49s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    01/11/2023, 14:22

General

  • Target

    NEAS.e658b34a99cb97329468327c81673e70.exe

  • Size

    266KB

  • MD5

    e658b34a99cb97329468327c81673e70

  • SHA1

    6c17af5be5e281cf79024625fd66011d8fb2c753

  • SHA256

    66d2f26fa2156e6fbfb84cb6ff0a26b7159d9803149507db168c84b567dcf7d8

  • SHA512

    2b7af1ee5e9b9cd8ceae710564b1111bdceb82c8a3fa49337329b3f8096ab7269b054bbce1f7901f534833f2b44554e246df1afde4e2c9d39d15bbf119b6e367

  • SSDEEP

    3072:WcX93xwq19gL2SjGojCJa79TBfsY5vXWqvuHcYnLzqP2r:WcNhJgX9z9TB0YRX8nx

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.e658b34a99cb97329468327c81673e70.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.e658b34a99cb97329468327c81673e70.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev34A7.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.e658b34a99cb97329468327c81673e70.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev34A7.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.E658B34A99CB97329468327C81673E70.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2556
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2412
  • C:\Users\Admin\AppData\Local\Temp\NEAS.E658B34A99CB97329468327C81673E70.EXE
    1⤵
    • Executes dropped EXE
    PID:2524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\NEAS.E658B34A99CB97329468327C81673E70.EXE

    Filesize

    266KB

    MD5

    1e3014e247e8414c34ecfa7f133256ac

    SHA1

    fc7826a7524098df9e1c4b834f3f74f77618ba88

    SHA256

    26d9268383b129f1de4f5cee3605576bb8bdd5600f8f857f1177821fc9a53a0c

    SHA512

    0efbf5b2ce74fb7f2996bab4dd50e88c3242b16ec97fcb81b836819626ada23c434151d482e9ea0eb2d151edbef40b6e10f55bb700b4338ba40814bcf7f5e603

  • C:\Users\Admin\AppData\Local\Temp\NEAS.E658B34A99CB97329468327C81673E70.EXE

    Filesize

    266KB

    MD5

    1e3014e247e8414c34ecfa7f133256ac

    SHA1

    fc7826a7524098df9e1c4b834f3f74f77618ba88

    SHA256

    26d9268383b129f1de4f5cee3605576bb8bdd5600f8f857f1177821fc9a53a0c

    SHA512

    0efbf5b2ce74fb7f2996bab4dd50e88c3242b16ec97fcb81b836819626ada23c434151d482e9ea0eb2d151edbef40b6e10f55bb700b4338ba40814bcf7f5e603

  • C:\Users\Admin\AppData\Local\Temp\NEAS.e658b34a99cb97329468327c81673e70.exe

    Filesize

    10KB

    MD5

    bf2411bc726873efb646f8b47f3e4efe

    SHA1

    225a0b4dc3a79bfaf8496a3185026b0a5340ea6b

    SHA256

    972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd

    SHA512

    fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2

  • C:\Users\Admin\AppData\Local\Temp\NEAS.e658b34a99cb97329468327c81673e70.exe

    Filesize

    10KB

    MD5

    bf2411bc726873efb646f8b47f3e4efe

    SHA1

    225a0b4dc3a79bfaf8496a3185026b0a5340ea6b

    SHA256

    972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd

    SHA512

    fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2

  • C:\WINDOWS\MSWDM.EXE

    Filesize

    256KB

    MD5

    8a1198209520897514a2d82a912a66d2

    SHA1

    5dda8ec47f948814d808cd71e89ebe65940a1ff7

    SHA256

    5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

    SHA512

    9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

  • C:\Windows\MSWDM.EXE

    Filesize

    256KB

    MD5

    8a1198209520897514a2d82a912a66d2

    SHA1

    5dda8ec47f948814d808cd71e89ebe65940a1ff7

    SHA256

    5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

    SHA512

    9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

  • C:\Windows\MSWDM.EXE

    Filesize

    256KB

    MD5

    8a1198209520897514a2d82a912a66d2

    SHA1

    5dda8ec47f948814d808cd71e89ebe65940a1ff7

    SHA256

    5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

    SHA512

    9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

  • C:\Windows\MSWDM.EXE

    Filesize

    256KB

    MD5

    8a1198209520897514a2d82a912a66d2

    SHA1

    5dda8ec47f948814d808cd71e89ebe65940a1ff7

    SHA256

    5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

    SHA512

    9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

  • C:\Windows\MSWDM.EXE

    Filesize

    256KB

    MD5

    8a1198209520897514a2d82a912a66d2

    SHA1

    5dda8ec47f948814d808cd71e89ebe65940a1ff7

    SHA256

    5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

    SHA512

    9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

  • C:\Windows\dev34A7.tmp

    Filesize

    10KB

    MD5

    bf2411bc726873efb646f8b47f3e4efe

    SHA1

    225a0b4dc3a79bfaf8496a3185026b0a5340ea6b

    SHA256

    972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd

    SHA512

    fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2

  • \Users\Admin\AppData\Local\Temp\NEAS.e658b34a99cb97329468327c81673e70.exe

    Filesize

    10KB

    MD5

    bf2411bc726873efb646f8b47f3e4efe

    SHA1

    225a0b4dc3a79bfaf8496a3185026b0a5340ea6b

    SHA256

    972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd

    SHA512

    fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2

  • \Users\Admin\AppData\Local\Temp\NEAS.e658b34a99cb97329468327c81673e70.exe

    Filesize

    10KB

    MD5

    bf2411bc726873efb646f8b47f3e4efe

    SHA1

    225a0b4dc3a79bfaf8496a3185026b0a5340ea6b

    SHA256

    972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd

    SHA512

    fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2

  • memory/2068-23-0x0000000000220000-0x0000000000225000-memory.dmp

    Filesize

    20KB

  • memory/2068-22-0x0000000000220000-0x0000000000225000-memory.dmp

    Filesize

    20KB

  • memory/2524-24-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB