Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/11/2023, 08:23

General

  • Target

    NEAS.e397033d25a21f4455830e225b680590.exe

  • Size

    521KB

  • MD5

    e397033d25a21f4455830e225b680590

  • SHA1

    4899b22bb5b93a0ff8e0acc9c0a463ce260afc30

  • SHA256

    bbe0916c7e4ff1710136b36133d0f63811c71f2a4fc7a94cdc05afb04d713205

  • SHA512

    f7bed04d71627b419125e321ad8c297cd03acf6962875745e3f1808c69cc18b616287238539d422746391c8e5679c781dd9a1b8ba2570917b32774e1aa0bb515

  • SSDEEP

    12288:k77S7j5V0FE8y0SSwOvFic+EbDFxq4LNUBjbrLG/SBPx1BsB:67S7j5VkE8yXSbvMfuHxIDLESBP/BsB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Program crash 18 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.e397033d25a21f4455830e225b680590.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.e397033d25a21f4455830e225b680590.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1788
    • C:\Users\Admin\AppData\Local\Temp\NEAS.e397033d25a21f4455830e225b680590.exe
      C:\Users\Admin\AppData\Local\Temp\NEAS.e397033d25a21f4455830e225b680590.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2236
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\NEAS.e397033d25a21f4455830e225b680590.exe" /TN sARMOys1f504 /F
        3⤵
        • Creates scheduled task(s)
        PID:3868
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN sARMOys1f504 > C:\Users\Admin\AppData\Local\Temp\Yf0X2N4Vw.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1588
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN sARMOys1f504
          4⤵
            PID:3364
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 608
          3⤵
          • Program crash
          PID:668
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 632
          3⤵
          • Program crash
          PID:3476
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 744
          3⤵
          • Program crash
          PID:2872
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 640
          3⤵
          • Program crash
          PID:4932
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 640
          3⤵
          • Program crash
          PID:1448
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 820
          3⤵
          • Program crash
          PID:4892
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 1460
          3⤵
          • Program crash
          PID:3480
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 1908
          3⤵
          • Program crash
          PID:1180
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 2144
          3⤵
          • Program crash
          PID:2036
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 1924
          3⤵
          • Program crash
          PID:640
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 2104
          3⤵
          • Program crash
          PID:3580
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 1936
          3⤵
          • Program crash
          PID:1080
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 1984
          3⤵
          • Program crash
          PID:4832
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 2152
          3⤵
          • Program crash
          PID:2328
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 2204
          3⤵
          • Program crash
          PID:3656
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 1956
          3⤵
          • Program crash
          PID:4844
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 2148
          3⤵
          • Program crash
          PID:3864
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 756
          3⤵
          • Program crash
          PID:3936
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2236 -ip 2236
      1⤵
        PID:3248
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2236 -ip 2236
        1⤵
          PID:752
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2236 -ip 2236
          1⤵
            PID:1884
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2236 -ip 2236
            1⤵
              PID:3056
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2236 -ip 2236
              1⤵
                PID:1440
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2236 -ip 2236
                1⤵
                  PID:64
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2236 -ip 2236
                  1⤵
                    PID:876
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2236 -ip 2236
                    1⤵
                      PID:1376
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2236 -ip 2236
                      1⤵
                        PID:4244
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2236 -ip 2236
                        1⤵
                          PID:2128
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2236 -ip 2236
                          1⤵
                            PID:776
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2236 -ip 2236
                            1⤵
                              PID:4408
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2236 -ip 2236
                              1⤵
                                PID:1336
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2236 -ip 2236
                                1⤵
                                  PID:1688
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2236 -ip 2236
                                  1⤵
                                    PID:1548
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2236 -ip 2236
                                    1⤵
                                      PID:2936
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2236 -ip 2236
                                      1⤵
                                        PID:2256
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2236 -ip 2236
                                        1⤵
                                          PID:5100

                                        Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\Local\Temp\NEAS.e397033d25a21f4455830e225b680590.exe

                                                Filesize

                                                521KB

                                                MD5

                                                2a4020fb5d7153cf0a689e4481bd548f

                                                SHA1

                                                8bb48656781d8c1439175689566199c66834f40f

                                                SHA256

                                                0aa8623b77002b1f3fdac7a2ed84040c447acd3938ae32aedcaad8cb6e91ca0f

                                                SHA512

                                                41b464b98b7ccfee2354bcb84ca510583001abce1ddcb6b4c92f2a65d4c6ae0265734ecaf207b02aa1449714036f00697c354f5f5641a94169457354b68118b6

                                              • C:\Users\Admin\AppData\Local\Temp\Yf0X2N4Vw.xml

                                                Filesize

                                                1KB

                                                MD5

                                                179a9c6064c8a32a8c41f90e2bbccfa8

                                                SHA1

                                                7fb14ec89431aae423d92325d75fd74a108ef43b

                                                SHA256

                                                a4342bc9b0072429714abc258950b9f0b1a885d2a38bf18d6cf3b883aad40e5b

                                                SHA512

                                                1d68b2140631bb2a2e0fed81ea6f6123399feba401fd2b78d2737e07d096c2fc3fb355c79c3346a7fc3071dae218b92f359c539dde2ff419b5bb1102fafdbe05

                                              • memory/1788-0-0x0000000000400000-0x000000000065C000-memory.dmp

                                                Filesize

                                                2.4MB

                                              • memory/1788-1-0x0000000000400000-0x000000000046B000-memory.dmp

                                                Filesize

                                                428KB

                                              • memory/1788-2-0x0000000024FF0000-0x000000002506E000-memory.dmp

                                                Filesize

                                                504KB

                                              • memory/1788-13-0x0000000000400000-0x000000000046B000-memory.dmp

                                                Filesize

                                                428KB

                                              • memory/2236-14-0x0000000000400000-0x000000000065C000-memory.dmp

                                                Filesize

                                                2.4MB

                                              • memory/2236-16-0x00000000016F0000-0x000000000176E000-memory.dmp

                                                Filesize

                                                504KB

                                              • memory/2236-22-0x00000000004B0000-0x000000000051B000-memory.dmp

                                                Filesize

                                                428KB

                                              • memory/2236-23-0x0000000000400000-0x000000000045B000-memory.dmp

                                                Filesize

                                                364KB

                                              • memory/2236-37-0x0000000000400000-0x000000000065C000-memory.dmp

                                                Filesize

                                                2.4MB