Analysis
-
max time kernel
28s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2023, 10:34
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.4e6e454c87e11ba172136c2fd733cc60.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.4e6e454c87e11ba172136c2fd733cc60.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.4e6e454c87e11ba172136c2fd733cc60.exe
-
Size
291KB
-
MD5
4e6e454c87e11ba172136c2fd733cc60
-
SHA1
c9f4d35bb94ce7a60e596a183ad5ce9ac881e789
-
SHA256
7bf2ce3d77b39121d2d8fcb681838fa31b5dbd8b8ee5a13bea8818044e0be5fe
-
SHA512
b18a9dbefc984cb0e36a4199e2ac55ed56b591354be9b871180bf9a078acb93f9d08151e880af38818cb17ada4fb066c83bfccc5587297b6c167c24231056345
-
SSDEEP
3072:WcX93xwq19gL2SjGojCJa79TBfsY5vXWqvuHcYnLzqP2soN5Cfsg:WcNhJgX9z9TB0YRX8naO5+
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 376 MSWDM.EXE 1316 MSWDM.EXE 244 NEAS.4E6E454C87E11BA172136C2FD733CC60.EXE 1536 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" NEAS.4e6e454c87e11ba172136c2fd733cc60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" NEAS.4e6e454c87e11ba172136c2fd733cc60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE NEAS.4e6e454c87e11ba172136c2fd733cc60.exe File opened for modification C:\Windows\devA8E2.tmp NEAS.4e6e454c87e11ba172136c2fd733cc60.exe File opened for modification C:\Windows\devA8E2.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1316 MSWDM.EXE 1316 MSWDM.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4384 wrote to memory of 376 4384 NEAS.4e6e454c87e11ba172136c2fd733cc60.exe 88 PID 4384 wrote to memory of 376 4384 NEAS.4e6e454c87e11ba172136c2fd733cc60.exe 88 PID 4384 wrote to memory of 376 4384 NEAS.4e6e454c87e11ba172136c2fd733cc60.exe 88 PID 4384 wrote to memory of 1316 4384 NEAS.4e6e454c87e11ba172136c2fd733cc60.exe 89 PID 4384 wrote to memory of 1316 4384 NEAS.4e6e454c87e11ba172136c2fd733cc60.exe 89 PID 4384 wrote to memory of 1316 4384 NEAS.4e6e454c87e11ba172136c2fd733cc60.exe 89 PID 1316 wrote to memory of 244 1316 MSWDM.EXE 90 PID 1316 wrote to memory of 244 1316 MSWDM.EXE 90 PID 1316 wrote to memory of 244 1316 MSWDM.EXE 90 PID 1316 wrote to memory of 1536 1316 MSWDM.EXE 93 PID 1316 wrote to memory of 1536 1316 MSWDM.EXE 93 PID 1316 wrote to memory of 1536 1316 MSWDM.EXE 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.4e6e454c87e11ba172136c2fd733cc60.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.4e6e454c87e11ba172136c2fd733cc60.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:376
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\devA8E2.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.4e6e454c87e11ba172136c2fd733cc60.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\NEAS.4E6E454C87E11BA172136C2FD733CC60.EXE
- Executes dropped EXE
PID:244
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\devA8E2.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.4E6E454C87E11BA172136C2FD733CC60.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1536
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
291KB
MD516abc63b5d8a4fab0cf9e1826475e556
SHA13647af418e97086d7ba5fd5b24f78a185a5d5b5a
SHA256b97cddc90013732903e07b78a9ca131bd400f449b904cf907b397967bc062aa1
SHA512d01e7a479e7508e47fe0c1cd60142a7cb14a8873b990e43278d89afa2060964d65bdcde2b2bcf75611743a85c82d604786b241be37d7e09c9df3ff1fc7d5a193
-
Filesize
291KB
MD516abc63b5d8a4fab0cf9e1826475e556
SHA13647af418e97086d7ba5fd5b24f78a185a5d5b5a
SHA256b97cddc90013732903e07b78a9ca131bd400f449b904cf907b397967bc062aa1
SHA512d01e7a479e7508e47fe0c1cd60142a7cb14a8873b990e43278d89afa2060964d65bdcde2b2bcf75611743a85c82d604786b241be37d7e09c9df3ff1fc7d5a193
-
Filesize
35KB
MD56a7c4dc0fe5a8a33154566b5071b47c4
SHA1265a1bcc6b6a6be7a7ad35194fb4984d7bb7ef88
SHA256152944690bb39772fc594430205be704f7068c7a4bbcbe58074ebceab9911cf4
SHA5128340ed45634757d05c95031541e8f655aabc7c7f4eab2caaf623c8b34bd0b2b08bb2c30f5f34faaee176b18730607308d492b1be10e098837fb6a450f344cf3e
-
Filesize
291KB
MD516abc63b5d8a4fab0cf9e1826475e556
SHA13647af418e97086d7ba5fd5b24f78a185a5d5b5a
SHA256b97cddc90013732903e07b78a9ca131bd400f449b904cf907b397967bc062aa1
SHA512d01e7a479e7508e47fe0c1cd60142a7cb14a8873b990e43278d89afa2060964d65bdcde2b2bcf75611743a85c82d604786b241be37d7e09c9df3ff1fc7d5a193
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
35KB
MD56a7c4dc0fe5a8a33154566b5071b47c4
SHA1265a1bcc6b6a6be7a7ad35194fb4984d7bb7ef88
SHA256152944690bb39772fc594430205be704f7068c7a4bbcbe58074ebceab9911cf4
SHA5128340ed45634757d05c95031541e8f655aabc7c7f4eab2caaf623c8b34bd0b2b08bb2c30f5f34faaee176b18730607308d492b1be10e098837fb6a450f344cf3e