Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
02/11/2023, 16:52
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f760175495109e78971f15627732cdf0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.f760175495109e78971f15627732cdf0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.f760175495109e78971f15627732cdf0.exe
-
Size
124KB
-
MD5
f760175495109e78971f15627732cdf0
-
SHA1
77f7191ca9608ad818684aeefafef67abd4f22ad
-
SHA256
7456203fcd381eacea58d2ae1dd1162f13bd6d2161a830369f1ebce5fa86bce9
-
SHA512
c568f631c87461296beed1eec6867ef2c53b67ce3eccf259a5b7883c726d1cd2a9add258c00f53a8a7f2e6215c730e5371ec47333a6ad429fbe6b90ac0a86a4e
-
SSDEEP
3072:Qq8f/oic1i9uTAlPQSDwEyWefHEvGdxETCpPJ:v8f/U1iF/sUGdxET
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2404 NEAS.f760175495109e78971f15627732cdf0.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2404 wrote to memory of 616 2404 NEAS.f760175495109e78971f15627732cdf0.exe 28 PID 2404 wrote to memory of 616 2404 NEAS.f760175495109e78971f15627732cdf0.exe 28 PID 2404 wrote to memory of 616 2404 NEAS.f760175495109e78971f15627732cdf0.exe 28 PID 2404 wrote to memory of 616 2404 NEAS.f760175495109e78971f15627732cdf0.exe 28 PID 616 wrote to memory of 2448 616 cmd.exe 30 PID 616 wrote to memory of 2448 616 cmd.exe 30 PID 616 wrote to memory of 2448 616 cmd.exe 30 PID 616 wrote to memory of 2448 616 cmd.exe 30 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2448 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f760175495109e78971f15627732cdf0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f760175495109e78971f15627732cdf0.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\eqt8F30.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\NEAS.f760175495109e78971f15627732cdf0.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\NEAS.f760175495109e78971f15627732cdf0.exe"3⤵
- Views/modifies file attributes
PID:2448
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53B
MD510681ffcf0ed97f3e25afc229b4a6387
SHA115462e9e1505d721c782ba6f859969d53cc8bb11
SHA2566207ed3240698339d27dff5684d0d37e1186b22ea33919e5a2dc0d90e7e3fe2e
SHA51288485214e7340fc66c50b835f6ed5f184b60974bb0d817dee1d53bdea035513c179c130f2c0923f4e9becc918b112226499a1831c8fed24a19f04bc0d936b95c
-
Filesize
53B
MD510681ffcf0ed97f3e25afc229b4a6387
SHA115462e9e1505d721c782ba6f859969d53cc8bb11
SHA2566207ed3240698339d27dff5684d0d37e1186b22ea33919e5a2dc0d90e7e3fe2e
SHA51288485214e7340fc66c50b835f6ed5f184b60974bb0d817dee1d53bdea035513c179c130f2c0923f4e9becc918b112226499a1831c8fed24a19f04bc0d936b95c