Analysis
-
max time kernel
128s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 14:24
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f50199135459240f9aa1a0b844f62960.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.f50199135459240f9aa1a0b844f62960.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.f50199135459240f9aa1a0b844f62960.exe
-
Size
225KB
-
MD5
f50199135459240f9aa1a0b844f62960
-
SHA1
0c40a05fd15875a1d34bc7ba7c4f3f4bf3163c2b
-
SHA256
d8ecb74302052f4db0a66fa52f15971cc235b07e4460d982119e9b1f601abfa7
-
SHA512
988e94773f062a391e75ca5d3a822b98b0a2cc772407e098a1ca4d04102a0423467b5562cb0cc3582496d46949781c128e891e128515387d5799309ee3e8843d
-
SSDEEP
1536:gvV6iLUWGI3UmkFlgZLu6xXXq5pm9AKTVSrowqOO6:gvV6iUW5UmkH+lxX6TmarowqJ6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2908 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 2448 NEAS.f50199135459240f9aa1a0b844f62960.exe 2448 NEAS.f50199135459240f9aa1a0b844f62960.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\f5400eb2\jusched.exe NEAS.f50199135459240f9aa1a0b844f62960.exe File created C:\Program Files (x86)\f5400eb2\f5400eb2 NEAS.f50199135459240f9aa1a0b844f62960.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job NEAS.f50199135459240f9aa1a0b844f62960.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2908 2448 NEAS.f50199135459240f9aa1a0b844f62960.exe 28 PID 2448 wrote to memory of 2908 2448 NEAS.f50199135459240f9aa1a0b844f62960.exe 28 PID 2448 wrote to memory of 2908 2448 NEAS.f50199135459240f9aa1a0b844f62960.exe 28 PID 2448 wrote to memory of 2908 2448 NEAS.f50199135459240f9aa1a0b844f62960.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f50199135459240f9aa1a0b844f62960.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f50199135459240f9aa1a0b844f62960.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Program Files (x86)\f5400eb2\jusched.exe"C:\Program Files (x86)\f5400eb2\jusched.exe"2⤵
- Executes dropped EXE
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD57bdf61d37c9adf3e1c6937107016091f
SHA156b8e0c454f9dd16d508a04b3afa7e458453ac41
SHA2564c57d86c256214baa0a5a3322ef5cdd575210455b7e964ad60382bd9d4be12e0
SHA512ff4fc1a427c84f47042375749f45ee6edea73b902ae977f14243ebceb7b9a28f41fe5dd404e3ea381754d9122202bc6b61ed0152b20a1c1be76c225dd20861d1
-
Filesize
225KB
MD5b569bf9154ffcc921387c3bde6b9f6d2
SHA16a197095450d7c4cc3a984c8fd97779855583317
SHA256de3ffea63dede3bbc7ac6dc32c59dd2bcafbe8a58f362fb72af58c5ab1bd148a
SHA512ccc48cd1c53abf155d873dd6c8ea3bffff321e7e8663182f918d2e36ae34ab1298a07e0f76ee3f0d851a14353b0112b75933eb89b127327a85e7c6a5e7b7f6b1
-
Filesize
225KB
MD5b569bf9154ffcc921387c3bde6b9f6d2
SHA16a197095450d7c4cc3a984c8fd97779855583317
SHA256de3ffea63dede3bbc7ac6dc32c59dd2bcafbe8a58f362fb72af58c5ab1bd148a
SHA512ccc48cd1c53abf155d873dd6c8ea3bffff321e7e8663182f918d2e36ae34ab1298a07e0f76ee3f0d851a14353b0112b75933eb89b127327a85e7c6a5e7b7f6b1
-
Filesize
225KB
MD5b569bf9154ffcc921387c3bde6b9f6d2
SHA16a197095450d7c4cc3a984c8fd97779855583317
SHA256de3ffea63dede3bbc7ac6dc32c59dd2bcafbe8a58f362fb72af58c5ab1bd148a
SHA512ccc48cd1c53abf155d873dd6c8ea3bffff321e7e8663182f918d2e36ae34ab1298a07e0f76ee3f0d851a14353b0112b75933eb89b127327a85e7c6a5e7b7f6b1
-
Filesize
225KB
MD5b569bf9154ffcc921387c3bde6b9f6d2
SHA16a197095450d7c4cc3a984c8fd97779855583317
SHA256de3ffea63dede3bbc7ac6dc32c59dd2bcafbe8a58f362fb72af58c5ab1bd148a
SHA512ccc48cd1c53abf155d873dd6c8ea3bffff321e7e8663182f918d2e36ae34ab1298a07e0f76ee3f0d851a14353b0112b75933eb89b127327a85e7c6a5e7b7f6b1