Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2023, 08:30
Behavioral task
behavioral1
Sample
NEAS.59c3e0a49dd5c8d86d14d0d2fab74dd0.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.59c3e0a49dd5c8d86d14d0d2fab74dd0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.59c3e0a49dd5c8d86d14d0d2fab74dd0.exe
-
Size
29KB
-
MD5
59c3e0a49dd5c8d86d14d0d2fab74dd0
-
SHA1
86ecdff07d0d013d478f7abefc9a01a77be3767f
-
SHA256
1ec2c8cafc2220da3363cbfdc81372fb8da35da292914d58a140d41c28fc865c
-
SHA512
9bcfe1b3e2eeb13ad88deed46250b3c78c96e89878e634b29dd778ba770b5045673a5a80de4f015b0e688f5b82caf2ea92ebbf628cdbdcde98e5edee4b98f04f
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/cN:AEwVs+0jNDY1qi/q8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3108 services.exe -
resource yara_rule behavioral2/memory/4652-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/files/0x0006000000022deb-4.dat upx behavioral2/files/0x0006000000022deb-7.dat upx behavioral2/memory/3108-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4652-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3108-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3108-16-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3108-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3108-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3108-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3108-33-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3108-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3108-40-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3108-45-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3108-50-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3108-52-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x000c000000022cfe-65.dat upx behavioral2/memory/4652-73-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3108-82-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4652-133-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3108-134-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4652-187-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3108-190-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4652-239-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3108-240-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" NEAS.59c3e0a49dd5c8d86d14d0d2fab74dd0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe NEAS.59c3e0a49dd5c8d86d14d0d2fab74dd0.exe File opened for modification C:\Windows\java.exe NEAS.59c3e0a49dd5c8d86d14d0d2fab74dd0.exe File created C:\Windows\java.exe NEAS.59c3e0a49dd5c8d86d14d0d2fab74dd0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4652 wrote to memory of 3108 4652 NEAS.59c3e0a49dd5c8d86d14d0d2fab74dd0.exe 86 PID 4652 wrote to memory of 3108 4652 NEAS.59c3e0a49dd5c8d86d14d0d2fab74dd0.exe 86 PID 4652 wrote to memory of 3108 4652 NEAS.59c3e0a49dd5c8d86d14d0d2fab74dd0.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.59c3e0a49dd5c8d86d14d0d2fab74dd0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.59c3e0a49dd5c8d86d14d0d2fab74dd0.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD5605de1f61d0446f81e63c25750e99301
SHA10eaf9121f9dc1338807a511f92ea0b30dc2982a5
SHA256049f75dee036da00f8c8366d29ee14268239df75b8be53aa104aec22b84560f0
SHA512a6a2505b8b89a895922ad6dc06d2ce620cb51cc6582c1b7e498a9f1ee1e4e47c53ebc4f92f8aa37532d558667225e30574732c9fe7187153a262c933893e4285
-
Filesize
305B
MD52c4ce699b73ce3278646321d836aca40
SHA172ead77fbd91cfadae8914cbb4c023a618bf0bd1
SHA256e7391b33aeb3be8afbe1b180430c606c5d3368baf7f458254cef5db9eef966e3
SHA51289ec604cd4a4ad37c5392da0bb28bd9072d731a3efdd38707eeb7b1caf7626e6917da687529bf9426d8eb89fab23175399032d545d96ab93ffd19dd54c02c075
-
Filesize
303B
MD50a53779b07f9c9c56ef169499851915e
SHA1281bf81610dae812be159f95a0858f88f9b96637
SHA256b946117d346ecf850135aae1ac65b368f4effd806bf5180ecd3c585f1324dbd1
SHA5125a5016dcdeef68be7115eafee0a6844e3cc868fa04f353980d924fca7394962d919d8dece40b15b7ddcc867f956fc8c0e522b68688ca409f1671c39e42973dc6
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
29KB
MD5b5b779793791a12c2bd86e5b739e9dc7
SHA18392b872b2e15939dd3efd21cad179b5cf7296de
SHA2562d50c12702e7106735a0665aa97db250125fbfedfff4f1ac3929c0b84c6962e4
SHA51219f2e2b2ccc63685ba9b70a3a8a28f750c9c66b6ee098a643c9fdd98b74cb39f76529d89cc94c0d3de97f72abe185b76e6df291bbab3765e14a20633486a3e01
-
Filesize
256B
MD5ec756e71cdcb94d0187816028ab951d4
SHA11cab84b30febae87805e7ae7cdd5b5a27658a265
SHA256b561366828e1822d3fb8e9e52ef1cbf8aada8af101e9af0371ca7ead46a941a7
SHA51242f420fd092420ee5780a0b7466cac6d142c450cdd11c3db4c210223ec340ca0db9ef5571411d6b54eeef6e09486f38493f4bd5dbde88f159388e27acc21c8d9
-
Filesize
288B
MD5b86c9a760cfa190e09c66f9ff2b390d9
SHA1fda6240a53acdb73f813ba20dba9627e4ea5dcbb
SHA2568b58251a1840317af36a6f8ba12aab55b1b2aebccdfe21d4c27e4163857b40dc
SHA51244b19b5cc1f8c0a3da6c697439852ba6dac2932b91493536d217348638511f475c6c6724a18b98aa9487753b729270db3382ee0fd2f29968c37c685307e80a9d
-
Filesize
288B
MD592eef2d0640993ebc827c79a7ffec9dc
SHA1796f231e86e20b7b5c277bf74fdce539b0496ca8
SHA25609475d46b52411f184188860c52db79e3e4dbc81ce2ff5e49d0445dad34775a8
SHA5129da8f737530b047c8e898f7ef51843ea7c40bf187a3314566aedb14016b8b3ea0aab4203ab850282f821de311303adc3a2cf59b97993b76f0249ef1613c59300
-
Filesize
288B
MD54238444bb541a6e50ebd2b46c07fb87b
SHA1b934cfaa57a753340ce601dcc1575ddb41e1bb37
SHA2560b257dae6833faac4124c4f188170ba0acfd158843e657cad10ff3d371cd2158
SHA512e391965c9fd31c34ea785bf1081c948da24894646975b961cef17bc8bda649d1eed43861649c31ec5d841dd6aa92f71807cc3aee89e2a60307c269a518c2c3de
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2