Analysis
-
max time kernel
151s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
03/11/2023, 16:12
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.db6b992c4c2cab22932aa462c93176b0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.db6b992c4c2cab22932aa462c93176b0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.db6b992c4c2cab22932aa462c93176b0.exe
-
Size
212KB
-
MD5
db6b992c4c2cab22932aa462c93176b0
-
SHA1
0bb0b3027465d0852a6f24a1db6e3be848501522
-
SHA256
7b8b5010eb5adf9c804d5778ad77dc0e8e8d53af10cb2d4ed22048340bb746aa
-
SHA512
9ff9b01efa36f4f7e27b220ae9a926095a4af273320be45a73923e1ac837b3cb461175848f1517ae1870115b6dfbaeaa5d184d0570e7bd3c8167072fa8e22d0b
-
SSDEEP
3072:Gv/IL44frgyGGqB/QH1VdzDu43d/9gCOuMHCV+yXSD7ihxrG/AIqfc6KpYffLT:4AU40GqVQV9tirCVcXinG/Af0ZSffL
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelPowerAgent6 = "rundll32.exe shell32.dll, ShellExec_RunDLL C:\\PROGRA~3\\a94fbc40.exe" svchost.exe -
Checks for any installed AV software in registry 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Avira svchost.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\AVAST Software\Avast svchost.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Eset\Nod svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 844 set thread context of 2236 844 NEAS.db6b992c4c2cab22932aa462c93176b0.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe 2236 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 844 NEAS.db6b992c4c2cab22932aa462c93176b0.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 844 wrote to memory of 2236 844 NEAS.db6b992c4c2cab22932aa462c93176b0.exe 28 PID 844 wrote to memory of 2236 844 NEAS.db6b992c4c2cab22932aa462c93176b0.exe 28 PID 844 wrote to memory of 2236 844 NEAS.db6b992c4c2cab22932aa462c93176b0.exe 28 PID 844 wrote to memory of 2236 844 NEAS.db6b992c4c2cab22932aa462c93176b0.exe 28 PID 844 wrote to memory of 2236 844 NEAS.db6b992c4c2cab22932aa462c93176b0.exe 28 PID 844 wrote to memory of 1668 844 NEAS.db6b992c4c2cab22932aa462c93176b0.exe 29 PID 844 wrote to memory of 1668 844 NEAS.db6b992c4c2cab22932aa462c93176b0.exe 29 PID 844 wrote to memory of 1668 844 NEAS.db6b992c4c2cab22932aa462c93176b0.exe 29 PID 844 wrote to memory of 1668 844 NEAS.db6b992c4c2cab22932aa462c93176b0.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.db6b992c4c2cab22932aa462c93176b0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.db6b992c4c2cab22932aa462c93176b0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\svchost.exeC:\ProgramData\a94fbc40.exe2⤵
- Adds Run key to start application
- Checks for any installed AV software in registry
- Suspicious behavior: EnumeratesProcesses
PID:2236
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\dxf430D.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\NEAS.db6b992c4c2cab22932aa462c93176b0.exe""2⤵PID:1668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34B
MD52ebedc77c1666d3421fc42089c844f8e
SHA16f1f65ca9c510c5f453f5cb62acfa76bb0902ec5
SHA25670f6e64bcf2cd7dddb0f07ac3ec87903471a4c4e4876e63f68ce5b085291ad19
SHA512d2060982bdf0766528930ae0238cc2d1781495d09e43332697c0549698c3c9bde50aae3391e7603e7448c40d241fcc5fc94f0e25a188501bfd0c185637d9c792
-
Filesize
34B
MD52ebedc77c1666d3421fc42089c844f8e
SHA16f1f65ca9c510c5f453f5cb62acfa76bb0902ec5
SHA25670f6e64bcf2cd7dddb0f07ac3ec87903471a4c4e4876e63f68ce5b085291ad19
SHA512d2060982bdf0766528930ae0238cc2d1781495d09e43332697c0549698c3c9bde50aae3391e7603e7448c40d241fcc5fc94f0e25a188501bfd0c185637d9c792