Analysis
-
max time kernel
15s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
03/11/2023, 10:34
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.4e6e454c87e11ba172136c2fd733cc60.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.4e6e454c87e11ba172136c2fd733cc60.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.4e6e454c87e11ba172136c2fd733cc60.exe
-
Size
291KB
-
MD5
4e6e454c87e11ba172136c2fd733cc60
-
SHA1
c9f4d35bb94ce7a60e596a183ad5ce9ac881e789
-
SHA256
7bf2ce3d77b39121d2d8fcb681838fa31b5dbd8b8ee5a13bea8818044e0be5fe
-
SHA512
b18a9dbefc984cb0e36a4199e2ac55ed56b591354be9b871180bf9a078acb93f9d08151e880af38818cb17ada4fb066c83bfccc5587297b6c167c24231056345
-
SSDEEP
3072:WcX93xwq19gL2SjGojCJa79TBfsY5vXWqvuHcYnLzqP2soN5Cfsg:WcNhJgX9z9TB0YRX8naO5+
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2284 MSWDM.EXE 2880 MSWDM.EXE 2660 NEAS.4E6E454C87E11BA172136C2FD733CC60.EXE 2668 MSWDM.EXE -
Loads dropped DLL 1 IoCs
pid Process 2880 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" NEAS.4e6e454c87e11ba172136c2fd733cc60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" NEAS.4e6e454c87e11ba172136c2fd733cc60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE NEAS.4e6e454c87e11ba172136c2fd733cc60.exe File opened for modification C:\Windows\dev88A0.tmp NEAS.4e6e454c87e11ba172136c2fd733cc60.exe File opened for modification C:\Windows\dev88A0.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2880 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2284 2340 NEAS.4e6e454c87e11ba172136c2fd733cc60.exe 28 PID 2340 wrote to memory of 2284 2340 NEAS.4e6e454c87e11ba172136c2fd733cc60.exe 28 PID 2340 wrote to memory of 2284 2340 NEAS.4e6e454c87e11ba172136c2fd733cc60.exe 28 PID 2340 wrote to memory of 2284 2340 NEAS.4e6e454c87e11ba172136c2fd733cc60.exe 28 PID 2340 wrote to memory of 2880 2340 NEAS.4e6e454c87e11ba172136c2fd733cc60.exe 29 PID 2340 wrote to memory of 2880 2340 NEAS.4e6e454c87e11ba172136c2fd733cc60.exe 29 PID 2340 wrote to memory of 2880 2340 NEAS.4e6e454c87e11ba172136c2fd733cc60.exe 29 PID 2340 wrote to memory of 2880 2340 NEAS.4e6e454c87e11ba172136c2fd733cc60.exe 29 PID 2880 wrote to memory of 2660 2880 MSWDM.EXE 30 PID 2880 wrote to memory of 2660 2880 MSWDM.EXE 30 PID 2880 wrote to memory of 2660 2880 MSWDM.EXE 30 PID 2880 wrote to memory of 2660 2880 MSWDM.EXE 30 PID 2880 wrote to memory of 2668 2880 MSWDM.EXE 32 PID 2880 wrote to memory of 2668 2880 MSWDM.EXE 32 PID 2880 wrote to memory of 2668 2880 MSWDM.EXE 32 PID 2880 wrote to memory of 2668 2880 MSWDM.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.4e6e454c87e11ba172136c2fd733cc60.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.4e6e454c87e11ba172136c2fd733cc60.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2284
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev88A0.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.4e6e454c87e11ba172136c2fd733cc60.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\NEAS.4E6E454C87E11BA172136C2FD733CC60.EXE
- Executes dropped EXE
PID:2660
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev88A0.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.4E6E454C87E11BA172136C2FD733CC60.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
291KB
MD5c7600ddfa143535fddbf8ae1d4bb7343
SHA12fbbe7c0759645ffc6dd4e7a90e55c0b06b4c52c
SHA2567385c497f689a11ade34eb34ea0f84f874f2317d35f7f8bcd25f987a3a7fd599
SHA512979b251a2a82b55d4f1143556028b3d68f6340d148a01e6aa197d8b9a34ec74946add974a500de65279e455aae956af61d7629ce8b102e48af8c7ac2f988c3be
-
Filesize
291KB
MD5c7600ddfa143535fddbf8ae1d4bb7343
SHA12fbbe7c0759645ffc6dd4e7a90e55c0b06b4c52c
SHA2567385c497f689a11ade34eb34ea0f84f874f2317d35f7f8bcd25f987a3a7fd599
SHA512979b251a2a82b55d4f1143556028b3d68f6340d148a01e6aa197d8b9a34ec74946add974a500de65279e455aae956af61d7629ce8b102e48af8c7ac2f988c3be
-
Filesize
35KB
MD56a7c4dc0fe5a8a33154566b5071b47c4
SHA1265a1bcc6b6a6be7a7ad35194fb4984d7bb7ef88
SHA256152944690bb39772fc594430205be704f7068c7a4bbcbe58074ebceab9911cf4
SHA5128340ed45634757d05c95031541e8f655aabc7c7f4eab2caaf623c8b34bd0b2b08bb2c30f5f34faaee176b18730607308d492b1be10e098837fb6a450f344cf3e
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
35KB
MD56a7c4dc0fe5a8a33154566b5071b47c4
SHA1265a1bcc6b6a6be7a7ad35194fb4984d7bb7ef88
SHA256152944690bb39772fc594430205be704f7068c7a4bbcbe58074ebceab9911cf4
SHA5128340ed45634757d05c95031541e8f655aabc7c7f4eab2caaf623c8b34bd0b2b08bb2c30f5f34faaee176b18730607308d492b1be10e098837fb6a450f344cf3e
-
Filesize
35KB
MD56a7c4dc0fe5a8a33154566b5071b47c4
SHA1265a1bcc6b6a6be7a7ad35194fb4984d7bb7ef88
SHA256152944690bb39772fc594430205be704f7068c7a4bbcbe58074ebceab9911cf4
SHA5128340ed45634757d05c95031541e8f655aabc7c7f4eab2caaf623c8b34bd0b2b08bb2c30f5f34faaee176b18730607308d492b1be10e098837fb6a450f344cf3e