Analysis
-
max time kernel
49s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.e658b34a99cb97329468327c81673e70.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.e658b34a99cb97329468327c81673e70.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.e658b34a99cb97329468327c81673e70.exe
-
Size
266KB
-
MD5
e658b34a99cb97329468327c81673e70
-
SHA1
6c17af5be5e281cf79024625fd66011d8fb2c753
-
SHA256
66d2f26fa2156e6fbfb84cb6ff0a26b7159d9803149507db168c84b567dcf7d8
-
SHA512
2b7af1ee5e9b9cd8ceae710564b1111bdceb82c8a3fa49337329b3f8096ab7269b054bbce1f7901f534833f2b44554e246df1afde4e2c9d39d15bbf119b6e367
-
SSDEEP
3072:WcX93xwq19gL2SjGojCJa79TBfsY5vXWqvuHcYnLzqP2r:WcNhJgX9z9TB0YRX8nx
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2068 MSWDM.EXE 2412 MSWDM.EXE 2524 NEAS.E658B34A99CB97329468327C81673E70.EXE 2556 MSWDM.EXE -
Loads dropped DLL 2 IoCs
pid Process 2068 MSWDM.EXE 2068 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" NEAS.e658b34a99cb97329468327c81673e70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" NEAS.e658b34a99cb97329468327c81673e70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE NEAS.e658b34a99cb97329468327c81673e70.exe File opened for modification C:\Windows\dev34A7.tmp NEAS.e658b34a99cb97329468327c81673e70.exe File opened for modification C:\Windows\dev34A7.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2068 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2412 2604 NEAS.e658b34a99cb97329468327c81673e70.exe 31 PID 2604 wrote to memory of 2412 2604 NEAS.e658b34a99cb97329468327c81673e70.exe 31 PID 2604 wrote to memory of 2412 2604 NEAS.e658b34a99cb97329468327c81673e70.exe 31 PID 2604 wrote to memory of 2412 2604 NEAS.e658b34a99cb97329468327c81673e70.exe 31 PID 2604 wrote to memory of 2068 2604 NEAS.e658b34a99cb97329468327c81673e70.exe 30 PID 2604 wrote to memory of 2068 2604 NEAS.e658b34a99cb97329468327c81673e70.exe 30 PID 2604 wrote to memory of 2068 2604 NEAS.e658b34a99cb97329468327c81673e70.exe 30 PID 2604 wrote to memory of 2068 2604 NEAS.e658b34a99cb97329468327c81673e70.exe 30 PID 2068 wrote to memory of 2524 2068 MSWDM.EXE 29 PID 2068 wrote to memory of 2524 2068 MSWDM.EXE 29 PID 2068 wrote to memory of 2524 2068 MSWDM.EXE 29 PID 2068 wrote to memory of 2524 2068 MSWDM.EXE 29 PID 2068 wrote to memory of 2556 2068 MSWDM.EXE 32 PID 2068 wrote to memory of 2556 2068 MSWDM.EXE 32 PID 2068 wrote to memory of 2556 2068 MSWDM.EXE 32 PID 2068 wrote to memory of 2556 2068 MSWDM.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.e658b34a99cb97329468327c81673e70.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e658b34a99cb97329468327c81673e70.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev34A7.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.e658b34a99cb97329468327c81673e70.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev34A7.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.E658B34A99CB97329468327C81673E70.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2556
-
-
-
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2412
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.E658B34A99CB97329468327C81673E70.EXE
- Executes dropped EXE
PID:2524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266KB
MD51e3014e247e8414c34ecfa7f133256ac
SHA1fc7826a7524098df9e1c4b834f3f74f77618ba88
SHA25626d9268383b129f1de4f5cee3605576bb8bdd5600f8f857f1177821fc9a53a0c
SHA5120efbf5b2ce74fb7f2996bab4dd50e88c3242b16ec97fcb81b836819626ada23c434151d482e9ea0eb2d151edbef40b6e10f55bb700b4338ba40814bcf7f5e603
-
Filesize
266KB
MD51e3014e247e8414c34ecfa7f133256ac
SHA1fc7826a7524098df9e1c4b834f3f74f77618ba88
SHA25626d9268383b129f1de4f5cee3605576bb8bdd5600f8f857f1177821fc9a53a0c
SHA5120efbf5b2ce74fb7f2996bab4dd50e88c3242b16ec97fcb81b836819626ada23c434151d482e9ea0eb2d151edbef40b6e10f55bb700b4338ba40814bcf7f5e603
-
Filesize
10KB
MD5bf2411bc726873efb646f8b47f3e4efe
SHA1225a0b4dc3a79bfaf8496a3185026b0a5340ea6b
SHA256972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd
SHA512fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2
-
Filesize
10KB
MD5bf2411bc726873efb646f8b47f3e4efe
SHA1225a0b4dc3a79bfaf8496a3185026b0a5340ea6b
SHA256972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd
SHA512fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
10KB
MD5bf2411bc726873efb646f8b47f3e4efe
SHA1225a0b4dc3a79bfaf8496a3185026b0a5340ea6b
SHA256972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd
SHA512fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2
-
Filesize
10KB
MD5bf2411bc726873efb646f8b47f3e4efe
SHA1225a0b4dc3a79bfaf8496a3185026b0a5340ea6b
SHA256972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd
SHA512fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2
-
Filesize
10KB
MD5bf2411bc726873efb646f8b47f3e4efe
SHA1225a0b4dc3a79bfaf8496a3185026b0a5340ea6b
SHA256972596c1a4f038f409b095e012e7ce95a38b82c1081fca9b6a4aa06c11853dcd
SHA512fe787b40ecba76ebf352175849ba152d76ac2d302120df6871764bf62130fce3ec8ead1d1a07b0a9735f0c1e3c7022bdbacba9f234f62c9fb1fd8a49e1ce34c2