Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
03-11-2023 13:42
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.1cea2b2f2e4071177f19f5f6d8e3e3f0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.1cea2b2f2e4071177f19f5f6d8e3e3f0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.1cea2b2f2e4071177f19f5f6d8e3e3f0.exe
-
Size
2.0MB
-
MD5
1cea2b2f2e4071177f19f5f6d8e3e3f0
-
SHA1
7fa064a7a55c7f672adae329757f665d23d2c580
-
SHA256
8f54df4085929128e6be50d0d9d113f62ba829518f10d0cca968aedcbd89adb3
-
SHA512
26b900be1b0dcf1f325b24dab653aecab70c06eec833f7ba6f92df79c114a9b7041e4af749151e43dcb3aca605a76ae41b9fc06fdd49088a4dd05ca94149cf8e
-
SSDEEP
49152:B884CWL0/fRZ12+zI9gQ2irbu9qhGjojqcs1LPhsUR:B8VjWJn69hF2RomcoLJ
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 2584 rundll32.exe 2584 rundll32.exe 2584 rundll32.exe 2584 rundll32.exe 2576 rundll32.exe 2576 rundll32.exe 2576 rundll32.exe 2576 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2652 2304 NEAS.1cea2b2f2e4071177f19f5f6d8e3e3f0.exe 28 PID 2304 wrote to memory of 2652 2304 NEAS.1cea2b2f2e4071177f19f5f6d8e3e3f0.exe 28 PID 2304 wrote to memory of 2652 2304 NEAS.1cea2b2f2e4071177f19f5f6d8e3e3f0.exe 28 PID 2304 wrote to memory of 2652 2304 NEAS.1cea2b2f2e4071177f19f5f6d8e3e3f0.exe 28 PID 2652 wrote to memory of 2596 2652 cmd.exe 30 PID 2652 wrote to memory of 2596 2652 cmd.exe 30 PID 2652 wrote to memory of 2596 2652 cmd.exe 30 PID 2652 wrote to memory of 2596 2652 cmd.exe 30 PID 2596 wrote to memory of 2584 2596 control.exe 31 PID 2596 wrote to memory of 2584 2596 control.exe 31 PID 2596 wrote to memory of 2584 2596 control.exe 31 PID 2596 wrote to memory of 2584 2596 control.exe 31 PID 2596 wrote to memory of 2584 2596 control.exe 31 PID 2596 wrote to memory of 2584 2596 control.exe 31 PID 2596 wrote to memory of 2584 2596 control.exe 31 PID 2584 wrote to memory of 2556 2584 rundll32.exe 32 PID 2584 wrote to memory of 2556 2584 rundll32.exe 32 PID 2584 wrote to memory of 2556 2584 rundll32.exe 32 PID 2584 wrote to memory of 2556 2584 rundll32.exe 32 PID 2556 wrote to memory of 2576 2556 RunDll32.exe 33 PID 2556 wrote to memory of 2576 2556 RunDll32.exe 33 PID 2556 wrote to memory of 2576 2556 RunDll32.exe 33 PID 2556 wrote to memory of 2576 2556 RunDll32.exe 33 PID 2556 wrote to memory of 2576 2556 RunDll32.exe 33 PID 2556 wrote to memory of 2576 2556 RunDll32.exe 33 PID 2556 wrote to memory of 2576 2556 RunDll32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.1cea2b2f2e4071177f19f5f6d8e3e3f0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.1cea2b2f2e4071177f19f5f6d8e3e3f0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\cmd.execmd /c .\B.cmD2⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\7zS00971D16\mbf.cpL",3⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7zS00971D16\mbf.cpL",4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7zS00971D16\mbf.cpL",5⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\7zS00971D16\mbf.cpL",6⤵
- Loads dropped DLL
PID:2576
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56B
MD502d0caaa980d5deb736e6e609230847c
SHA1445ba31b1613a0cff52cc8324c610206f73318fd
SHA256d8fa9cde9a46cdfb3422855c05fc0be8131bd98f8ba1eac8f62041ca6b1f2bf6
SHA5125555ad4cc7b27ce47602798fca7b7f40fea2cfd4ff32f7ed59f04e3294dc6b43109d3c93c7bad5f2ad1851e9d8b48c0594b48c4704e2ad7dc7d202e48d8636c6
-
Filesize
56B
MD502d0caaa980d5deb736e6e609230847c
SHA1445ba31b1613a0cff52cc8324c610206f73318fd
SHA256d8fa9cde9a46cdfb3422855c05fc0be8131bd98f8ba1eac8f62041ca6b1f2bf6
SHA5125555ad4cc7b27ce47602798fca7b7f40fea2cfd4ff32f7ed59f04e3294dc6b43109d3c93c7bad5f2ad1851e9d8b48c0594b48c4704e2ad7dc7d202e48d8636c6
-
Filesize
2.0MB
MD56c85abc6bd8a06c4d072e0b509ccc8b4
SHA1fb78e5a18fc7a50b7e84d774c9624a351b5b6c31
SHA256953a5b0d5a57eb4aa25d9acca6facf01960685f2dccfed545bc73a1b48faece4
SHA512843f56d83d7648329408da9bdaf3e29c03b109bb2ca4f79cbd12f30dd586fd006f827b0f9362fec927331c5131fdaefde4c6d4b6feddefd4e09093f4a57aa86d
-
Filesize
2.0MB
MD56c85abc6bd8a06c4d072e0b509ccc8b4
SHA1fb78e5a18fc7a50b7e84d774c9624a351b5b6c31
SHA256953a5b0d5a57eb4aa25d9acca6facf01960685f2dccfed545bc73a1b48faece4
SHA512843f56d83d7648329408da9bdaf3e29c03b109bb2ca4f79cbd12f30dd586fd006f827b0f9362fec927331c5131fdaefde4c6d4b6feddefd4e09093f4a57aa86d
-
Filesize
2.0MB
MD56c85abc6bd8a06c4d072e0b509ccc8b4
SHA1fb78e5a18fc7a50b7e84d774c9624a351b5b6c31
SHA256953a5b0d5a57eb4aa25d9acca6facf01960685f2dccfed545bc73a1b48faece4
SHA512843f56d83d7648329408da9bdaf3e29c03b109bb2ca4f79cbd12f30dd586fd006f827b0f9362fec927331c5131fdaefde4c6d4b6feddefd4e09093f4a57aa86d
-
Filesize
2.0MB
MD56c85abc6bd8a06c4d072e0b509ccc8b4
SHA1fb78e5a18fc7a50b7e84d774c9624a351b5b6c31
SHA256953a5b0d5a57eb4aa25d9acca6facf01960685f2dccfed545bc73a1b48faece4
SHA512843f56d83d7648329408da9bdaf3e29c03b109bb2ca4f79cbd12f30dd586fd006f827b0f9362fec927331c5131fdaefde4c6d4b6feddefd4e09093f4a57aa86d
-
Filesize
2.0MB
MD56c85abc6bd8a06c4d072e0b509ccc8b4
SHA1fb78e5a18fc7a50b7e84d774c9624a351b5b6c31
SHA256953a5b0d5a57eb4aa25d9acca6facf01960685f2dccfed545bc73a1b48faece4
SHA512843f56d83d7648329408da9bdaf3e29c03b109bb2ca4f79cbd12f30dd586fd006f827b0f9362fec927331c5131fdaefde4c6d4b6feddefd4e09093f4a57aa86d
-
Filesize
2.0MB
MD56c85abc6bd8a06c4d072e0b509ccc8b4
SHA1fb78e5a18fc7a50b7e84d774c9624a351b5b6c31
SHA256953a5b0d5a57eb4aa25d9acca6facf01960685f2dccfed545bc73a1b48faece4
SHA512843f56d83d7648329408da9bdaf3e29c03b109bb2ca4f79cbd12f30dd586fd006f827b0f9362fec927331c5131fdaefde4c6d4b6feddefd4e09093f4a57aa86d
-
Filesize
2.0MB
MD56c85abc6bd8a06c4d072e0b509ccc8b4
SHA1fb78e5a18fc7a50b7e84d774c9624a351b5b6c31
SHA256953a5b0d5a57eb4aa25d9acca6facf01960685f2dccfed545bc73a1b48faece4
SHA512843f56d83d7648329408da9bdaf3e29c03b109bb2ca4f79cbd12f30dd586fd006f827b0f9362fec927331c5131fdaefde4c6d4b6feddefd4e09093f4a57aa86d
-
Filesize
2.0MB
MD56c85abc6bd8a06c4d072e0b509ccc8b4
SHA1fb78e5a18fc7a50b7e84d774c9624a351b5b6c31
SHA256953a5b0d5a57eb4aa25d9acca6facf01960685f2dccfed545bc73a1b48faece4
SHA512843f56d83d7648329408da9bdaf3e29c03b109bb2ca4f79cbd12f30dd586fd006f827b0f9362fec927331c5131fdaefde4c6d4b6feddefd4e09093f4a57aa86d
-
Filesize
2.0MB
MD56c85abc6bd8a06c4d072e0b509ccc8b4
SHA1fb78e5a18fc7a50b7e84d774c9624a351b5b6c31
SHA256953a5b0d5a57eb4aa25d9acca6facf01960685f2dccfed545bc73a1b48faece4
SHA512843f56d83d7648329408da9bdaf3e29c03b109bb2ca4f79cbd12f30dd586fd006f827b0f9362fec927331c5131fdaefde4c6d4b6feddefd4e09093f4a57aa86d