Analysis
-
max time kernel
125s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
03/11/2023, 15:20
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0c26e2f634ca1ca7869059cb097acde0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.0c26e2f634ca1ca7869059cb097acde0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.0c26e2f634ca1ca7869059cb097acde0.exe
-
Size
185KB
-
MD5
0c26e2f634ca1ca7869059cb097acde0
-
SHA1
09f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
-
SHA256
4961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
-
SHA512
74c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
SSDEEP
3072:zxNr1TjqTSIbr/EDL8XvzdR1RiDPimUMl4oboVZc446rnKQa:lNr1TsSIbr7vzdYDPRQYC46L
Malware Config
Signatures
-
Executes dropped EXE 9 IoCs
pid Process 2468 WinDat.exe 2840 WinDat.exe 2588 WinDat.exe 1640 WinDat.exe 2644 WinDat.exe 2360 WinDat.exe 2884 WinDat.exe 2992 WinDat.exe 2404 WinDat.exe -
Loads dropped DLL 18 IoCs
pid Process 2392 NEAS.0c26e2f634ca1ca7869059cb097acde0.exe 2392 NEAS.0c26e2f634ca1ca7869059cb097acde0.exe 2468 WinDat.exe 2468 WinDat.exe 2840 WinDat.exe 2840 WinDat.exe 2588 WinDat.exe 2588 WinDat.exe 1640 WinDat.exe 1640 WinDat.exe 2644 WinDat.exe 2644 WinDat.exe 2360 WinDat.exe 2360 WinDat.exe 2884 WinDat.exe 2884 WinDat.exe 2992 WinDat.exe 2992 WinDat.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinDat.exe WinDat.exe File opened for modification C:\Windows\SysWOW64\WinDat.exe WinDat.exe File created C:\Windows\SysWOW64\WinDat.exe WinDat.exe File opened for modification C:\Windows\SysWOW64\WinDat.exe WinDat.exe File opened for modification C:\Windows\SysWOW64\WinDat.exe WinDat.exe File created C:\Windows\SysWOW64\WinDat.exe WinDat.exe File created C:\Windows\SysWOW64\WinDat.exe WinDat.exe File created C:\Windows\SysWOW64\WinDat.exe WinDat.exe File opened for modification C:\Windows\SysWOW64\WinDat.exe WinDat.exe File opened for modification C:\Windows\SysWOW64\WinDat.exe WinDat.exe File opened for modification C:\Windows\SysWOW64\WinDat.exe WinDat.exe File created C:\Windows\SysWOW64\WinDat.exe NEAS.0c26e2f634ca1ca7869059cb097acde0.exe File created C:\Windows\SysWOW64\WinDat.exe WinDat.exe File created C:\Windows\SysWOW64\WinDat.exe WinDat.exe File opened for modification C:\Windows\SysWOW64\WinDat.exe WinDat.exe File created C:\Windows\SysWOW64\WinDat.exe WinDat.exe File opened for modification C:\Windows\SysWOW64\WinDat.exe NEAS.0c26e2f634ca1ca7869059cb097acde0.exe File opened for modification C:\Windows\SysWOW64\WinDat.exe WinDat.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2468 2392 NEAS.0c26e2f634ca1ca7869059cb097acde0.exe 28 PID 2392 wrote to memory of 2468 2392 NEAS.0c26e2f634ca1ca7869059cb097acde0.exe 28 PID 2392 wrote to memory of 2468 2392 NEAS.0c26e2f634ca1ca7869059cb097acde0.exe 28 PID 2392 wrote to memory of 2468 2392 NEAS.0c26e2f634ca1ca7869059cb097acde0.exe 28 PID 2468 wrote to memory of 2840 2468 WinDat.exe 29 PID 2468 wrote to memory of 2840 2468 WinDat.exe 29 PID 2468 wrote to memory of 2840 2468 WinDat.exe 29 PID 2468 wrote to memory of 2840 2468 WinDat.exe 29 PID 2840 wrote to memory of 2588 2840 WinDat.exe 30 PID 2840 wrote to memory of 2588 2840 WinDat.exe 30 PID 2840 wrote to memory of 2588 2840 WinDat.exe 30 PID 2840 wrote to memory of 2588 2840 WinDat.exe 30 PID 2588 wrote to memory of 1640 2588 WinDat.exe 33 PID 2588 wrote to memory of 1640 2588 WinDat.exe 33 PID 2588 wrote to memory of 1640 2588 WinDat.exe 33 PID 2588 wrote to memory of 1640 2588 WinDat.exe 33 PID 1640 wrote to memory of 2644 1640 WinDat.exe 34 PID 1640 wrote to memory of 2644 1640 WinDat.exe 34 PID 1640 wrote to memory of 2644 1640 WinDat.exe 34 PID 1640 wrote to memory of 2644 1640 WinDat.exe 34 PID 2644 wrote to memory of 2360 2644 WinDat.exe 35 PID 2644 wrote to memory of 2360 2644 WinDat.exe 35 PID 2644 wrote to memory of 2360 2644 WinDat.exe 35 PID 2644 wrote to memory of 2360 2644 WinDat.exe 35 PID 2360 wrote to memory of 2884 2360 WinDat.exe 36 PID 2360 wrote to memory of 2884 2360 WinDat.exe 36 PID 2360 wrote to memory of 2884 2360 WinDat.exe 36 PID 2360 wrote to memory of 2884 2360 WinDat.exe 36 PID 2884 wrote to memory of 2992 2884 WinDat.exe 37 PID 2884 wrote to memory of 2992 2884 WinDat.exe 37 PID 2884 wrote to memory of 2992 2884 WinDat.exe 37 PID 2884 wrote to memory of 2992 2884 WinDat.exe 37 PID 2992 wrote to memory of 2404 2992 WinDat.exe 38 PID 2992 wrote to memory of 2404 2992 WinDat.exe 38 PID 2992 wrote to memory of 2404 2992 WinDat.exe 38 PID 2992 wrote to memory of 2404 2992 WinDat.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.0c26e2f634ca1ca7869059cb097acde0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.0c26e2f634ca1ca7869059cb097acde0.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\WinDat.exeC:\Windows\system32\WinDat.exe 536 "C:\Users\Admin\AppData\Local\Temp\NEAS.0c26e2f634ca1ca7869059cb097acde0.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\WinDat.exeC:\Windows\system32\WinDat.exe 540 "C:\Windows\SysWOW64\WinDat.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\WinDat.exeC:\Windows\system32\WinDat.exe 452 "C:\Windows\SysWOW64\WinDat.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\WinDat.exeC:\Windows\system32\WinDat.exe 532 "C:\Windows\SysWOW64\WinDat.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\WinDat.exeC:\Windows\system32\WinDat.exe 556 "C:\Windows\SysWOW64\WinDat.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\WinDat.exeC:\Windows\system32\WinDat.exe 548 "C:\Windows\SysWOW64\WinDat.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\WinDat.exeC:\Windows\system32\WinDat.exe 552 "C:\Windows\SysWOW64\WinDat.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\WinDat.exeC:\Windows\system32\WinDat.exe 568 "C:\Windows\SysWOW64\WinDat.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\WinDat.exeC:\Windows\system32\WinDat.exe 576 "C:\Windows\SysWOW64\WinDat.exe"10⤵
- Executes dropped EXE
PID:2404
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e
-
Filesize
185KB
MD50c26e2f634ca1ca7869059cb097acde0
SHA109f9c0cf0a767888f5ba7e8f7cd65d0f4fca6dbe
SHA2564961429048770cd281dcb033e2790ee524f1427fd33d573264b93269f671e1e7
SHA51274c1a4be6d3b1e4db6bb3db010fb2bdccec2451261677609a9998202816c4b5cceae66ef6423e6ba94444a9de5b01e9ede4fa7236af35921e071212b4610095e