Analysis

  • max time kernel
    28s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/11/2023, 10:34

General

  • Target

    NEAS.4e6e454c87e11ba172136c2fd733cc60.exe

  • Size

    291KB

  • MD5

    4e6e454c87e11ba172136c2fd733cc60

  • SHA1

    c9f4d35bb94ce7a60e596a183ad5ce9ac881e789

  • SHA256

    7bf2ce3d77b39121d2d8fcb681838fa31b5dbd8b8ee5a13bea8818044e0be5fe

  • SHA512

    b18a9dbefc984cb0e36a4199e2ac55ed56b591354be9b871180bf9a078acb93f9d08151e880af38818cb17ada4fb066c83bfccc5587297b6c167c24231056345

  • SSDEEP

    3072:WcX93xwq19gL2SjGojCJa79TBfsY5vXWqvuHcYnLzqP2soN5Cfsg:WcNhJgX9z9TB0YRX8naO5+

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.4e6e454c87e11ba172136c2fd733cc60.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.4e6e454c87e11ba172136c2fd733cc60.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4384
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:376
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\devA8E2.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.4e6e454c87e11ba172136c2fd733cc60.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1316
      • C:\Users\Admin\AppData\Local\Temp\NEAS.4E6E454C87E11BA172136C2FD733CC60.EXE
        3⤵
        • Executes dropped EXE
        PID:244
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\devA8E2.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.4E6E454C87E11BA172136C2FD733CC60.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1536

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\NEAS.4E6E454C87E11BA172136C2FD733CC60.EXE

          Filesize

          291KB

          MD5

          16abc63b5d8a4fab0cf9e1826475e556

          SHA1

          3647af418e97086d7ba5fd5b24f78a185a5d5b5a

          SHA256

          b97cddc90013732903e07b78a9ca131bd400f449b904cf907b397967bc062aa1

          SHA512

          d01e7a479e7508e47fe0c1cd60142a7cb14a8873b990e43278d89afa2060964d65bdcde2b2bcf75611743a85c82d604786b241be37d7e09c9df3ff1fc7d5a193

        • C:\Users\Admin\AppData\Local\Temp\NEAS.4E6E454C87E11BA172136C2FD733CC60.EXE

          Filesize

          291KB

          MD5

          16abc63b5d8a4fab0cf9e1826475e556

          SHA1

          3647af418e97086d7ba5fd5b24f78a185a5d5b5a

          SHA256

          b97cddc90013732903e07b78a9ca131bd400f449b904cf907b397967bc062aa1

          SHA512

          d01e7a479e7508e47fe0c1cd60142a7cb14a8873b990e43278d89afa2060964d65bdcde2b2bcf75611743a85c82d604786b241be37d7e09c9df3ff1fc7d5a193

        • C:\Users\Admin\AppData\Local\Temp\NEAS.4e6e454c87e11ba172136c2fd733cc60.exe

          Filesize

          35KB

          MD5

          6a7c4dc0fe5a8a33154566b5071b47c4

          SHA1

          265a1bcc6b6a6be7a7ad35194fb4984d7bb7ef88

          SHA256

          152944690bb39772fc594430205be704f7068c7a4bbcbe58074ebceab9911cf4

          SHA512

          8340ed45634757d05c95031541e8f655aabc7c7f4eab2caaf623c8b34bd0b2b08bb2c30f5f34faaee176b18730607308d492b1be10e098837fb6a450f344cf3e

        • C:\Users\Admin\AppData\Local\Temp\NEAS.4e6e454c87e11ba172136c2fd733cc60.exe

          Filesize

          291KB

          MD5

          16abc63b5d8a4fab0cf9e1826475e556

          SHA1

          3647af418e97086d7ba5fd5b24f78a185a5d5b5a

          SHA256

          b97cddc90013732903e07b78a9ca131bd400f449b904cf907b397967bc062aa1

          SHA512

          d01e7a479e7508e47fe0c1cd60142a7cb14a8873b990e43278d89afa2060964d65bdcde2b2bcf75611743a85c82d604786b241be37d7e09c9df3ff1fc7d5a193

        • C:\WINDOWS\MSWDM.EXE

          Filesize

          256KB

          MD5

          8a1198209520897514a2d82a912a66d2

          SHA1

          5dda8ec47f948814d808cd71e89ebe65940a1ff7

          SHA256

          5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

          SHA512

          9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

        • C:\Windows\MSWDM.EXE

          Filesize

          256KB

          MD5

          8a1198209520897514a2d82a912a66d2

          SHA1

          5dda8ec47f948814d808cd71e89ebe65940a1ff7

          SHA256

          5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

          SHA512

          9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

        • C:\Windows\MSWDM.EXE

          Filesize

          256KB

          MD5

          8a1198209520897514a2d82a912a66d2

          SHA1

          5dda8ec47f948814d808cd71e89ebe65940a1ff7

          SHA256

          5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

          SHA512

          9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

        • C:\Windows\MSWDM.EXE

          Filesize

          256KB

          MD5

          8a1198209520897514a2d82a912a66d2

          SHA1

          5dda8ec47f948814d808cd71e89ebe65940a1ff7

          SHA256

          5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

          SHA512

          9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

        • C:\Windows\devA8E2.tmp

          Filesize

          35KB

          MD5

          6a7c4dc0fe5a8a33154566b5071b47c4

          SHA1

          265a1bcc6b6a6be7a7ad35194fb4984d7bb7ef88

          SHA256

          152944690bb39772fc594430205be704f7068c7a4bbcbe58074ebceab9911cf4

          SHA512

          8340ed45634757d05c95031541e8f655aabc7c7f4eab2caaf623c8b34bd0b2b08bb2c30f5f34faaee176b18730607308d492b1be10e098837fb6a450f344cf3e