Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
03-11-2023 08:24
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.ca73ff468d48e456a45d29b1a7927120.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.ca73ff468d48e456a45d29b1a7927120.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.ca73ff468d48e456a45d29b1a7927120.exe
-
Size
39KB
-
MD5
ca73ff468d48e456a45d29b1a7927120
-
SHA1
382398f83abe9be245558f02feb8544fc7fbadd1
-
SHA256
0188f47e6a620863c9b6661a197d570cea8ab43ff6dcbb8388f3e6a310ccdfea
-
SHA512
79e872268162ec085d15f2f9d3b3ba5ce48d2403aa6b381b126a034e4799b0190b9d032a63304b66df3347f804c627f78a865fafbdbbd2efdf32e58279b9f956
-
SSDEEP
768:om05k4mjNmntC2ojHXRrs9sINeZEtejlIkoLN127BFVn2p4lAnZ8Oqt+D3Dy1r0A:q+vjNmnVojXRrs9sINeZEtejlIkoLN1u
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2388 realupdater.exe -
Loads dropped DLL 4 IoCs
pid Process 2016 NEAS.ca73ff468d48e456a45d29b1a7927120.exe 2388 realupdater.exe 2388 realupdater.exe 2388 realupdater.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2388 2016 NEAS.ca73ff468d48e456a45d29b1a7927120.exe 28 PID 2016 wrote to memory of 2388 2016 NEAS.ca73ff468d48e456a45d29b1a7927120.exe 28 PID 2016 wrote to memory of 2388 2016 NEAS.ca73ff468d48e456a45d29b1a7927120.exe 28 PID 2016 wrote to memory of 2388 2016 NEAS.ca73ff468d48e456a45d29b1a7927120.exe 28 PID 2016 wrote to memory of 2388 2016 NEAS.ca73ff468d48e456a45d29b1a7927120.exe 28 PID 2016 wrote to memory of 2388 2016 NEAS.ca73ff468d48e456a45d29b1a7927120.exe 28 PID 2016 wrote to memory of 2388 2016 NEAS.ca73ff468d48e456a45d29b1a7927120.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.ca73ff468d48e456a45d29b1a7927120.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.ca73ff468d48e456a45d29b1a7927120.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\realupdater.exe"C:\Users\Admin\AppData\Local\Temp\realupdater.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD51f97641675b7a18610b56622cbe433bd
SHA1e5205609148c20ebbfd07beddcee58e220bbada0
SHA256330f85f90ea38ca691135f9298a4d998f41b2cc7060153ce6f6174abf13e5514
SHA5129684aee78d9cb97ca6d041de9b09237e2fa39c73f4ce5dd94ba5e656ef887f9bf96fa3c7eca6237dc29f638c893a8f199bc31fe8622db1c3076fd9201ec0202d
-
Filesize
40KB
MD51f97641675b7a18610b56622cbe433bd
SHA1e5205609148c20ebbfd07beddcee58e220bbada0
SHA256330f85f90ea38ca691135f9298a4d998f41b2cc7060153ce6f6174abf13e5514
SHA5129684aee78d9cb97ca6d041de9b09237e2fa39c73f4ce5dd94ba5e656ef887f9bf96fa3c7eca6237dc29f638c893a8f199bc31fe8622db1c3076fd9201ec0202d
-
Filesize
40KB
MD51f97641675b7a18610b56622cbe433bd
SHA1e5205609148c20ebbfd07beddcee58e220bbada0
SHA256330f85f90ea38ca691135f9298a4d998f41b2cc7060153ce6f6174abf13e5514
SHA5129684aee78d9cb97ca6d041de9b09237e2fa39c73f4ce5dd94ba5e656ef887f9bf96fa3c7eca6237dc29f638c893a8f199bc31fe8622db1c3076fd9201ec0202d
-
Filesize
40KB
MD51f97641675b7a18610b56622cbe433bd
SHA1e5205609148c20ebbfd07beddcee58e220bbada0
SHA256330f85f90ea38ca691135f9298a4d998f41b2cc7060153ce6f6174abf13e5514
SHA5129684aee78d9cb97ca6d041de9b09237e2fa39c73f4ce5dd94ba5e656ef887f9bf96fa3c7eca6237dc29f638c893a8f199bc31fe8622db1c3076fd9201ec0202d
-
Filesize
40KB
MD51f97641675b7a18610b56622cbe433bd
SHA1e5205609148c20ebbfd07beddcee58e220bbada0
SHA256330f85f90ea38ca691135f9298a4d998f41b2cc7060153ce6f6174abf13e5514
SHA5129684aee78d9cb97ca6d041de9b09237e2fa39c73f4ce5dd94ba5e656ef887f9bf96fa3c7eca6237dc29f638c893a8f199bc31fe8622db1c3076fd9201ec0202d
-
Filesize
40KB
MD51f97641675b7a18610b56622cbe433bd
SHA1e5205609148c20ebbfd07beddcee58e220bbada0
SHA256330f85f90ea38ca691135f9298a4d998f41b2cc7060153ce6f6174abf13e5514
SHA5129684aee78d9cb97ca6d041de9b09237e2fa39c73f4ce5dd94ba5e656ef887f9bf96fa3c7eca6237dc29f638c893a8f199bc31fe8622db1c3076fd9201ec0202d