Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
03/11/2023, 11:53
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.8277147e808fdccd8cb3cb8299e82e30.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.8277147e808fdccd8cb3cb8299e82e30.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.8277147e808fdccd8cb3cb8299e82e30.exe
-
Size
1.3MB
-
MD5
8277147e808fdccd8cb3cb8299e82e30
-
SHA1
17d3cd78f197e6cb3c17f2570f9d40543bba9ecb
-
SHA256
831a04ea1dae4d5fb42743fdc5321e532c17fed2cf6dc130467bcc025842252a
-
SHA512
2228623cb39199f2d6cc6ef287ab21331ec88aeb149c6a5ef6468aabc25366d1cc733efdfa05c512c2f7f5e10e3478749c445c1a33f82bbb4ee1513391863e12
-
SSDEEP
12288:iMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9NiXIigo+qwl6:insJ39LyjbJkQFMhmC+6GD94Xt1+qw8
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2804 ._cache_NEAS.8277147e808fdccd8cb3cb8299e82e30.exe 2832 Synaptics.exe 2664 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2212 NEAS.8277147e808fdccd8cb3cb8299e82e30.exe 2212 NEAS.8277147e808fdccd8cb3cb8299e82e30.exe 2212 NEAS.8277147e808fdccd8cb3cb8299e82e30.exe 2832 Synaptics.exe 2832 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" NEAS.8277147e808fdccd8cb3cb8299e82e30.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2804 2212 NEAS.8277147e808fdccd8cb3cb8299e82e30.exe 28 PID 2212 wrote to memory of 2804 2212 NEAS.8277147e808fdccd8cb3cb8299e82e30.exe 28 PID 2212 wrote to memory of 2804 2212 NEAS.8277147e808fdccd8cb3cb8299e82e30.exe 28 PID 2212 wrote to memory of 2804 2212 NEAS.8277147e808fdccd8cb3cb8299e82e30.exe 28 PID 2212 wrote to memory of 2832 2212 NEAS.8277147e808fdccd8cb3cb8299e82e30.exe 30 PID 2212 wrote to memory of 2832 2212 NEAS.8277147e808fdccd8cb3cb8299e82e30.exe 30 PID 2212 wrote to memory of 2832 2212 NEAS.8277147e808fdccd8cb3cb8299e82e30.exe 30 PID 2212 wrote to memory of 2832 2212 NEAS.8277147e808fdccd8cb3cb8299e82e30.exe 30 PID 2832 wrote to memory of 2664 2832 Synaptics.exe 31 PID 2832 wrote to memory of 2664 2832 Synaptics.exe 31 PID 2832 wrote to memory of 2664 2832 Synaptics.exe 31 PID 2832 wrote to memory of 2664 2832 Synaptics.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.8277147e808fdccd8cb3cb8299e82e30.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.8277147e808fdccd8cb3cb8299e82e30.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\._cache_NEAS.8277147e808fdccd8cb3cb8299e82e30.exe"C:\Users\Admin\AppData\Local\Temp\._cache_NEAS.8277147e808fdccd8cb3cb8299e82e30.exe"2⤵
- Executes dropped EXE
PID:2804
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2664
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD58277147e808fdccd8cb3cb8299e82e30
SHA117d3cd78f197e6cb3c17f2570f9d40543bba9ecb
SHA256831a04ea1dae4d5fb42743fdc5321e532c17fed2cf6dc130467bcc025842252a
SHA5122228623cb39199f2d6cc6ef287ab21331ec88aeb149c6a5ef6468aabc25366d1cc733efdfa05c512c2f7f5e10e3478749c445c1a33f82bbb4ee1513391863e12
-
Filesize
1.3MB
MD58277147e808fdccd8cb3cb8299e82e30
SHA117d3cd78f197e6cb3c17f2570f9d40543bba9ecb
SHA256831a04ea1dae4d5fb42743fdc5321e532c17fed2cf6dc130467bcc025842252a
SHA5122228623cb39199f2d6cc6ef287ab21331ec88aeb149c6a5ef6468aabc25366d1cc733efdfa05c512c2f7f5e10e3478749c445c1a33f82bbb4ee1513391863e12
-
Filesize
1.3MB
MD58277147e808fdccd8cb3cb8299e82e30
SHA117d3cd78f197e6cb3c17f2570f9d40543bba9ecb
SHA256831a04ea1dae4d5fb42743fdc5321e532c17fed2cf6dc130467bcc025842252a
SHA5122228623cb39199f2d6cc6ef287ab21331ec88aeb149c6a5ef6468aabc25366d1cc733efdfa05c512c2f7f5e10e3478749c445c1a33f82bbb4ee1513391863e12
-
Filesize
557KB
MD5c766853e9158449855b5d9cc0925904b
SHA19cd986cbca432e46d2a34ea54ce69a7066fcb342
SHA256956314ce4abf95cb91ff32bca737a615dc38bcb1fb349a96e4e4fa5fd64252ca
SHA51206c5de1113f5ff7f718a11b927dfd59d0538c88807809d700a342f589bba274d233fd83c0fd86c588ae2ea54e7c0b45179ee0c0da1ddd85d9e430734fb6dc504
-
Filesize
557KB
MD5c766853e9158449855b5d9cc0925904b
SHA19cd986cbca432e46d2a34ea54ce69a7066fcb342
SHA256956314ce4abf95cb91ff32bca737a615dc38bcb1fb349a96e4e4fa5fd64252ca
SHA51206c5de1113f5ff7f718a11b927dfd59d0538c88807809d700a342f589bba274d233fd83c0fd86c588ae2ea54e7c0b45179ee0c0da1ddd85d9e430734fb6dc504
-
Filesize
557KB
MD5c766853e9158449855b5d9cc0925904b
SHA19cd986cbca432e46d2a34ea54ce69a7066fcb342
SHA256956314ce4abf95cb91ff32bca737a615dc38bcb1fb349a96e4e4fa5fd64252ca
SHA51206c5de1113f5ff7f718a11b927dfd59d0538c88807809d700a342f589bba274d233fd83c0fd86c588ae2ea54e7c0b45179ee0c0da1ddd85d9e430734fb6dc504
-
Filesize
557KB
MD5c766853e9158449855b5d9cc0925904b
SHA19cd986cbca432e46d2a34ea54ce69a7066fcb342
SHA256956314ce4abf95cb91ff32bca737a615dc38bcb1fb349a96e4e4fa5fd64252ca
SHA51206c5de1113f5ff7f718a11b927dfd59d0538c88807809d700a342f589bba274d233fd83c0fd86c588ae2ea54e7c0b45179ee0c0da1ddd85d9e430734fb6dc504
-
Filesize
557KB
MD5c766853e9158449855b5d9cc0925904b
SHA19cd986cbca432e46d2a34ea54ce69a7066fcb342
SHA256956314ce4abf95cb91ff32bca737a615dc38bcb1fb349a96e4e4fa5fd64252ca
SHA51206c5de1113f5ff7f718a11b927dfd59d0538c88807809d700a342f589bba274d233fd83c0fd86c588ae2ea54e7c0b45179ee0c0da1ddd85d9e430734fb6dc504
-
Filesize
1.3MB
MD58277147e808fdccd8cb3cb8299e82e30
SHA117d3cd78f197e6cb3c17f2570f9d40543bba9ecb
SHA256831a04ea1dae4d5fb42743fdc5321e532c17fed2cf6dc130467bcc025842252a
SHA5122228623cb39199f2d6cc6ef287ab21331ec88aeb149c6a5ef6468aabc25366d1cc733efdfa05c512c2f7f5e10e3478749c445c1a33f82bbb4ee1513391863e12
-
Filesize
1.3MB
MD58277147e808fdccd8cb3cb8299e82e30
SHA117d3cd78f197e6cb3c17f2570f9d40543bba9ecb
SHA256831a04ea1dae4d5fb42743fdc5321e532c17fed2cf6dc130467bcc025842252a
SHA5122228623cb39199f2d6cc6ef287ab21331ec88aeb149c6a5ef6468aabc25366d1cc733efdfa05c512c2f7f5e10e3478749c445c1a33f82bbb4ee1513391863e12
-
Filesize
1.3MB
MD58277147e808fdccd8cb3cb8299e82e30
SHA117d3cd78f197e6cb3c17f2570f9d40543bba9ecb
SHA256831a04ea1dae4d5fb42743fdc5321e532c17fed2cf6dc130467bcc025842252a
SHA5122228623cb39199f2d6cc6ef287ab21331ec88aeb149c6a5ef6468aabc25366d1cc733efdfa05c512c2f7f5e10e3478749c445c1a33f82bbb4ee1513391863e12
-
Filesize
557KB
MD5c766853e9158449855b5d9cc0925904b
SHA19cd986cbca432e46d2a34ea54ce69a7066fcb342
SHA256956314ce4abf95cb91ff32bca737a615dc38bcb1fb349a96e4e4fa5fd64252ca
SHA51206c5de1113f5ff7f718a11b927dfd59d0538c88807809d700a342f589bba274d233fd83c0fd86c588ae2ea54e7c0b45179ee0c0da1ddd85d9e430734fb6dc504
-
Filesize
557KB
MD5c766853e9158449855b5d9cc0925904b
SHA19cd986cbca432e46d2a34ea54ce69a7066fcb342
SHA256956314ce4abf95cb91ff32bca737a615dc38bcb1fb349a96e4e4fa5fd64252ca
SHA51206c5de1113f5ff7f718a11b927dfd59d0538c88807809d700a342f589bba274d233fd83c0fd86c588ae2ea54e7c0b45179ee0c0da1ddd85d9e430734fb6dc504