Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01-11-2023 14:22
Behavioral task
behavioral1
Sample
NEAS.e246850a5f88ca3e91d39775c778a4d0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.e246850a5f88ca3e91d39775c778a4d0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.e246850a5f88ca3e91d39775c778a4d0.exe
-
Size
3.8MB
-
MD5
e246850a5f88ca3e91d39775c778a4d0
-
SHA1
6bdab39b185fa5cfa0afcda19e4270523e68cc54
-
SHA256
6a6b4a8cee6456f96d0c4105ebe0c630a29e8c095d2113f5d46e6564ebc9efbe
-
SHA512
7afcdea07f761bea36a02af4d8bcaaccbd2ee913974f6c864055858a379d84ff76723a24b32a4ff4740b46d561c5c5829b620e2f035cd586d66971a2e63d41cd
-
SSDEEP
98304:WjzV+xBDel4pbPEz6QdzzkXFdL1pEx0Lcl4W/1DV7eMawz4:yYDf9PEz6QdzzYdL1psJyMa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3036 SETUP.EXE -
Loads dropped DLL 4 IoCs
pid Process 2372 NEAS.e246850a5f88ca3e91d39775c778a4d0.exe 3036 SETUP.EXE 3036 SETUP.EXE 3036 SETUP.EXE -
resource yara_rule behavioral1/memory/2372-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2372-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3036 SETUP.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3036 SETUP.EXE 3036 SETUP.EXE 3036 SETUP.EXE 3036 SETUP.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2372 wrote to memory of 3036 2372 NEAS.e246850a5f88ca3e91d39775c778a4d0.exe 28 PID 2372 wrote to memory of 3036 2372 NEAS.e246850a5f88ca3e91d39775c778a4d0.exe 28 PID 2372 wrote to memory of 3036 2372 NEAS.e246850a5f88ca3e91d39775c778a4d0.exe 28 PID 2372 wrote to memory of 3036 2372 NEAS.e246850a5f88ca3e91d39775c778a4d0.exe 28 PID 2372 wrote to memory of 3036 2372 NEAS.e246850a5f88ca3e91d39775c778a4d0.exe 28 PID 2372 wrote to memory of 3036 2372 NEAS.e246850a5f88ca3e91d39775c778a4d0.exe 28 PID 2372 wrote to memory of 3036 2372 NEAS.e246850a5f88ca3e91d39775c778a4d0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.e246850a5f88ca3e91d39775c778a4d0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e246850a5f88ca3e91d39775c778a4d0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\SETUP.EXE"C:\Users\Admin\AppData\Local\Temp\RarSFX0\SETUP.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.2MB
MD53a3ded731622b9da7bc5f82b6ee86fe7
SHA1fcba6eebd391f3881fb9064c7d3a632d742cd73e
SHA2562d226fd8ba41273078db9ce056d2b020dcabbf0c20fa7cf4cdb4485219046f1d
SHA51218cb0596e022efe4d906ad55217aa6d8b7a8c74b54efdc07c926bd16ddb4ceaf007f5b82ddcd6b2684086970795311d8f76156edcfe80256730f8bbfa89a914c
-
Filesize
7.2MB
MD53a3ded731622b9da7bc5f82b6ee86fe7
SHA1fcba6eebd391f3881fb9064c7d3a632d742cd73e
SHA2562d226fd8ba41273078db9ce056d2b020dcabbf0c20fa7cf4cdb4485219046f1d
SHA51218cb0596e022efe4d906ad55217aa6d8b7a8c74b54efdc07c926bd16ddb4ceaf007f5b82ddcd6b2684086970795311d8f76156edcfe80256730f8bbfa89a914c
-
Filesize
7.2MB
MD53a3ded731622b9da7bc5f82b6ee86fe7
SHA1fcba6eebd391f3881fb9064c7d3a632d742cd73e
SHA2562d226fd8ba41273078db9ce056d2b020dcabbf0c20fa7cf4cdb4485219046f1d
SHA51218cb0596e022efe4d906ad55217aa6d8b7a8c74b54efdc07c926bd16ddb4ceaf007f5b82ddcd6b2684086970795311d8f76156edcfe80256730f8bbfa89a914c
-
Filesize
7.2MB
MD53a3ded731622b9da7bc5f82b6ee86fe7
SHA1fcba6eebd391f3881fb9064c7d3a632d742cd73e
SHA2562d226fd8ba41273078db9ce056d2b020dcabbf0c20fa7cf4cdb4485219046f1d
SHA51218cb0596e022efe4d906ad55217aa6d8b7a8c74b54efdc07c926bd16ddb4ceaf007f5b82ddcd6b2684086970795311d8f76156edcfe80256730f8bbfa89a914c
-
Filesize
7.2MB
MD53a3ded731622b9da7bc5f82b6ee86fe7
SHA1fcba6eebd391f3881fb9064c7d3a632d742cd73e
SHA2562d226fd8ba41273078db9ce056d2b020dcabbf0c20fa7cf4cdb4485219046f1d
SHA51218cb0596e022efe4d906ad55217aa6d8b7a8c74b54efdc07c926bd16ddb4ceaf007f5b82ddcd6b2684086970795311d8f76156edcfe80256730f8bbfa89a914c
-
Filesize
7.2MB
MD53a3ded731622b9da7bc5f82b6ee86fe7
SHA1fcba6eebd391f3881fb9064c7d3a632d742cd73e
SHA2562d226fd8ba41273078db9ce056d2b020dcabbf0c20fa7cf4cdb4485219046f1d
SHA51218cb0596e022efe4d906ad55217aa6d8b7a8c74b54efdc07c926bd16ddb4ceaf007f5b82ddcd6b2684086970795311d8f76156edcfe80256730f8bbfa89a914c
-
Filesize
7.2MB
MD53a3ded731622b9da7bc5f82b6ee86fe7
SHA1fcba6eebd391f3881fb9064c7d3a632d742cd73e
SHA2562d226fd8ba41273078db9ce056d2b020dcabbf0c20fa7cf4cdb4485219046f1d
SHA51218cb0596e022efe4d906ad55217aa6d8b7a8c74b54efdc07c926bd16ddb4ceaf007f5b82ddcd6b2684086970795311d8f76156edcfe80256730f8bbfa89a914c