Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    03-11-2023 08:24

General

  • Target

    NEAS.ca73ff468d48e456a45d29b1a7927120.exe

  • Size

    39KB

  • MD5

    ca73ff468d48e456a45d29b1a7927120

  • SHA1

    382398f83abe9be245558f02feb8544fc7fbadd1

  • SHA256

    0188f47e6a620863c9b6661a197d570cea8ab43ff6dcbb8388f3e6a310ccdfea

  • SHA512

    79e872268162ec085d15f2f9d3b3ba5ce48d2403aa6b381b126a034e4799b0190b9d032a63304b66df3347f804c627f78a865fafbdbbd2efdf32e58279b9f956

  • SSDEEP

    768:om05k4mjNmntC2ojHXRrs9sINeZEtejlIkoLN127BFVn2p4lAnZ8Oqt+D3Dy1r0A:q+vjNmnVojXRrs9sINeZEtejlIkoLN1u

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.ca73ff468d48e456a45d29b1a7927120.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.ca73ff468d48e456a45d29b1a7927120.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\realupdater.exe
      "C:\Users\Admin\AppData\Local\Temp\realupdater.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\realupdater.exe

    Filesize

    40KB

    MD5

    1f97641675b7a18610b56622cbe433bd

    SHA1

    e5205609148c20ebbfd07beddcee58e220bbada0

    SHA256

    330f85f90ea38ca691135f9298a4d998f41b2cc7060153ce6f6174abf13e5514

    SHA512

    9684aee78d9cb97ca6d041de9b09237e2fa39c73f4ce5dd94ba5e656ef887f9bf96fa3c7eca6237dc29f638c893a8f199bc31fe8622db1c3076fd9201ec0202d

  • C:\Users\Admin\AppData\Local\Temp\realupdater.exe

    Filesize

    40KB

    MD5

    1f97641675b7a18610b56622cbe433bd

    SHA1

    e5205609148c20ebbfd07beddcee58e220bbada0

    SHA256

    330f85f90ea38ca691135f9298a4d998f41b2cc7060153ce6f6174abf13e5514

    SHA512

    9684aee78d9cb97ca6d041de9b09237e2fa39c73f4ce5dd94ba5e656ef887f9bf96fa3c7eca6237dc29f638c893a8f199bc31fe8622db1c3076fd9201ec0202d

  • \Users\Admin\AppData\Local\Temp\realupdater.exe

    Filesize

    40KB

    MD5

    1f97641675b7a18610b56622cbe433bd

    SHA1

    e5205609148c20ebbfd07beddcee58e220bbada0

    SHA256

    330f85f90ea38ca691135f9298a4d998f41b2cc7060153ce6f6174abf13e5514

    SHA512

    9684aee78d9cb97ca6d041de9b09237e2fa39c73f4ce5dd94ba5e656ef887f9bf96fa3c7eca6237dc29f638c893a8f199bc31fe8622db1c3076fd9201ec0202d

  • \Users\Admin\AppData\Local\Temp\realupdater.exe

    Filesize

    40KB

    MD5

    1f97641675b7a18610b56622cbe433bd

    SHA1

    e5205609148c20ebbfd07beddcee58e220bbada0

    SHA256

    330f85f90ea38ca691135f9298a4d998f41b2cc7060153ce6f6174abf13e5514

    SHA512

    9684aee78d9cb97ca6d041de9b09237e2fa39c73f4ce5dd94ba5e656ef887f9bf96fa3c7eca6237dc29f638c893a8f199bc31fe8622db1c3076fd9201ec0202d

  • \Users\Admin\AppData\Local\Temp\realupdater.exe

    Filesize

    40KB

    MD5

    1f97641675b7a18610b56622cbe433bd

    SHA1

    e5205609148c20ebbfd07beddcee58e220bbada0

    SHA256

    330f85f90ea38ca691135f9298a4d998f41b2cc7060153ce6f6174abf13e5514

    SHA512

    9684aee78d9cb97ca6d041de9b09237e2fa39c73f4ce5dd94ba5e656ef887f9bf96fa3c7eca6237dc29f638c893a8f199bc31fe8622db1c3076fd9201ec0202d

  • \Users\Admin\AppData\Local\Temp\realupdater.exe

    Filesize

    40KB

    MD5

    1f97641675b7a18610b56622cbe433bd

    SHA1

    e5205609148c20ebbfd07beddcee58e220bbada0

    SHA256

    330f85f90ea38ca691135f9298a4d998f41b2cc7060153ce6f6174abf13e5514

    SHA512

    9684aee78d9cb97ca6d041de9b09237e2fa39c73f4ce5dd94ba5e656ef887f9bf96fa3c7eca6237dc29f638c893a8f199bc31fe8622db1c3076fd9201ec0202d

  • memory/2016-1-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2388-11-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB