Analysis

  • max time kernel
    130s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/11/2023, 16:49

General

  • Target

    NEAS.c82f69b7cb50fe3539ef37144641c500.exe

  • Size

    128KB

  • MD5

    c82f69b7cb50fe3539ef37144641c500

  • SHA1

    c41979d6bec69fe1616a175291f54966e9496a8c

  • SHA256

    cb0f91d2a45983852a35e78589102a67c7fad2aab6ea67d1e053da548da3d827

  • SHA512

    f42b5ce03d676e8d527820b3a38e77d07f6741b01ac07c3535be8000f3c4b236a725592eccd228db0083019891e7352c8631ee204d7b97c843b84a5b21feb2e5

  • SSDEEP

    3072:Te41eh3m0CYa8iZjsm6HB3p36o2fR39j+85N2dD:6Ph3wYpiZjn6HbZ2Z39j5GD

Score
8/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.c82f69b7cb50fe3539ef37144641c500.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.c82f69b7cb50fe3539ef37144641c500.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1728
  • C:\PROGRA~3\Mozilla\axfniqh.exe
    C:\PROGRA~3\Mozilla\axfniqh.exe -pdtylqd
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:5064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\axfniqh.exe

    Filesize

    128KB

    MD5

    5c904de700896f96cd992acaee4537ab

    SHA1

    94d762a636e5e007413e72de13f0a07f8d9d4e02

    SHA256

    d3491e03d665ea665e4b2111c6c7378bbe02c1e43dba1ae57bb17ea18c0f0155

    SHA512

    9ea2fbe7a545439ebeb2907beeb9fa2d4af916a6c23b1784c8e09e3dea3c5ed6093bb04d6cdb01204bd84b45ef1c6b0644154f9b2570ced82d75a2559d680f64

  • C:\ProgramData\Mozilla\axfniqh.exe

    Filesize

    128KB

    MD5

    5c904de700896f96cd992acaee4537ab

    SHA1

    94d762a636e5e007413e72de13f0a07f8d9d4e02

    SHA256

    d3491e03d665ea665e4b2111c6c7378bbe02c1e43dba1ae57bb17ea18c0f0155

    SHA512

    9ea2fbe7a545439ebeb2907beeb9fa2d4af916a6c23b1784c8e09e3dea3c5ed6093bb04d6cdb01204bd84b45ef1c6b0644154f9b2570ced82d75a2559d680f64

  • memory/1728-3-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/1728-0-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/1728-6-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/1728-1-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/1728-2-0x0000000000730000-0x0000000000731000-memory.dmp

    Filesize

    4KB

  • memory/1728-10-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/1728-11-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/5064-12-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/5064-14-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/5064-13-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/5064-17-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/5064-18-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/5064-20-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB