Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2023 15:09
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.ac8ebc20a1597b2c79e300ed217df2f0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.ac8ebc20a1597b2c79e300ed217df2f0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.ac8ebc20a1597b2c79e300ed217df2f0.exe
-
Size
736KB
-
MD5
ac8ebc20a1597b2c79e300ed217df2f0
-
SHA1
77ef37b56984ff95df96bd69563000e3150ada98
-
SHA256
619bd16df62803a060223f9590c66005e728c184ab64b73ed0c4f315293e6dea
-
SHA512
a4ab19a2f08147b074347f24c70866890947510f661ed9a74182748b74f9936bd770527bd595d0c91199bc0774f4af79bff5524fe39645d86be550246bde732a
-
SSDEEP
12288:P1/aGLDCMNpNAkoSzZWD8ayX2MQCw7D0FoWxJpcEi0/3IWV//7cSdX5rzj8jF//F:P1/aGLDCM4D8ayGMZo8/CZ//F
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 764 wjffrt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\wjffrt.exe" wjffrt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2096 wrote to memory of 764 2096 NEAS.ac8ebc20a1597b2c79e300ed217df2f0.exe 52 PID 2096 wrote to memory of 764 2096 NEAS.ac8ebc20a1597b2c79e300ed217df2f0.exe 52 PID 2096 wrote to memory of 764 2096 NEAS.ac8ebc20a1597b2c79e300ed217df2f0.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.ac8ebc20a1597b2c79e300ed217df2f0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.ac8ebc20a1597b2c79e300ed217df2f0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\ProgramData\wjffrt.exe"C:\ProgramData\wjffrt.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
736KB
MD5b228ac47bdcaef0e57af78308eeb5e91
SHA10a9aaf3afaf4de4739f4a2042e0ca2e1cd93eb5b
SHA25602c07a3385dccdca95469802de18ccf8ab75afeccc4614d17730f291bc1365ff
SHA512e45deeb8fff3008fc508be85df3832f15b2dbf6d654fabf9fd4556d17040f6260e75e368c36640eeec64ee1f7d4aabae6e9b96a7b7ab3cd16b11a12aadbf04d3
-
Filesize
477KB
MD570d6cb7dd01ebd5a21af02945d2ae12f
SHA105260b3e17a221e66b58d1e5ed1d0f518392159a
SHA256136fb79a4b868976a011043345fbef2cb088dd799757ec3970480eb99d9f2e92
SHA512b2c4c5b6bc5519ebb8e701c37eb298f6bdbb89b09bbf93a4f5c7a0e5b809b7bb3a6355087797e5064c1cc67a1555cbdab782fcba2f8a9d0f18d4f53337a34ea9
-
Filesize
477KB
MD570d6cb7dd01ebd5a21af02945d2ae12f
SHA105260b3e17a221e66b58d1e5ed1d0f518392159a
SHA256136fb79a4b868976a011043345fbef2cb088dd799757ec3970480eb99d9f2e92
SHA512b2c4c5b6bc5519ebb8e701c37eb298f6bdbb89b09bbf93a4f5c7a0e5b809b7bb3a6355087797e5064c1cc67a1555cbdab782fcba2f8a9d0f18d4f53337a34ea9
-
Filesize
258KB
MD546affebd920fc7979559d93489a26384
SHA1fb860b657f2516488e858a19bbea46f05d88f05b
SHA256f363e12eb5cc474e047e695008128eb49d04198509f1e133224a733bb0f9a1ae
SHA512b39533a51bc5664f0289b264ddbf784d318b1d30a09f17f41be437a7ac1def2c105da5a8d827df165d768dac1acbb94d6f95bee8a8d55c17a1e9f0e518b589d4
-
Filesize
258KB
MD546affebd920fc7979559d93489a26384
SHA1fb860b657f2516488e858a19bbea46f05d88f05b
SHA256f363e12eb5cc474e047e695008128eb49d04198509f1e133224a733bb0f9a1ae
SHA512b39533a51bc5664f0289b264ddbf784d318b1d30a09f17f41be437a7ac1def2c105da5a8d827df165d768dac1acbb94d6f95bee8a8d55c17a1e9f0e518b589d4