Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/11/2023, 22:12

General

  • Target

    NEAS.0df5019760e56f4328e9fae8a25d2350.exe

  • Size

    29KB

  • MD5

    0df5019760e56f4328e9fae8a25d2350

  • SHA1

    14b13d453094a3ee8e8960a13102379ebe7d8dc9

  • SHA256

    6b629e6b04152ab237fe4c5378fa4f1d36ee5871d13345840526ba1a6f86bcef

  • SHA512

    1b384e1141a5978ceeb3bce9ecd4020ffcabfc26903f319e59c75884c49ea0376d271b00db4d84c220a3d93e33dd69a1f5fd870e4fc2213203d43487e149e3f3

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/zQ1:AEwVs+0jNDY1qi/q01

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 27 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.0df5019760e56f4328e9fae8a25d2350.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.0df5019760e56f4328e9fae8a25d2350.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4128
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:3836

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\5FZHGTXM\default[2].htm

          Filesize

          305B

          MD5

          2c4ce699b73ce3278646321d836aca40

          SHA1

          72ead77fbd91cfadae8914cbb4c023a618bf0bd1

          SHA256

          e7391b33aeb3be8afbe1b180430c606c5d3368baf7f458254cef5db9eef966e3

          SHA512

          89ec604cd4a4ad37c5392da0bb28bd9072d731a3efdd38707eeb7b1caf7626e6917da687529bf9426d8eb89fab23175399032d545d96ab93ffd19dd54c02c075

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\E51EX1F6\search[1].htm

          Filesize

          25B

          MD5

          8ba61a16b71609a08bfa35bc213fce49

          SHA1

          8374dddcc6b2ede14b0ea00a5870a11b57ced33f

          SHA256

          6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

          SHA512

          5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\FG4P7PGK\default[10].htm

          Filesize

          305B

          MD5

          157431349a057954f4227efc1383ecad

          SHA1

          69ccc939e6b36aa1fabb96ad999540a5ab118c48

          SHA256

          8553409a8a3813197c474a95d9ae35630e2a67f8e6f9f33b3f39ef4c78a8bfac

          SHA512

          6405adcfa81b53980f448c489c1d13506d874d839925bffe5826479105cbf5ba194a7bdb93095585441c79c58de42f1dab1138b3d561011dc60f4b66d11e9284

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\FG4P7PGK\default[2].htm

          Filesize

          304B

          MD5

          605de1f61d0446f81e63c25750e99301

          SHA1

          0eaf9121f9dc1338807a511f92ea0b30dc2982a5

          SHA256

          049f75dee036da00f8c8366d29ee14268239df75b8be53aa104aec22b84560f0

          SHA512

          a6a2505b8b89a895922ad6dc06d2ce620cb51cc6582c1b7e498a9f1ee1e4e47c53ebc4f92f8aa37532d558667225e30574732c9fe7187153a262c933893e4285

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\FG4P7PGK\default[3].htm

          Filesize

          302B

          MD5

          51b86971925c7d24d895ff89fdebc8f5

          SHA1

          d037148e50a77f0de8421e0ef81f87f9f73570da

          SHA256

          3b50a39db6499f5cb2d3b6cec01daa5c33fcf80c0722707c6014e23ed1577280

          SHA512

          1bc88174ee963971ca43e106828d9e74473cf1aa664f6d4fa43ec9631610ab4c1dc9a0c84f5c89dd2b627eaf64f57dee99eca84b88eb14c36bf7285cb9d7f0c4

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LZ39371N\default[3].htm

          Filesize

          304B

          MD5

          8fc460e5c1851dae2ede898b85804b31

          SHA1

          c2887be287c1ea86cd250c38fb4e55518f764abe

          SHA256

          7b5f9fe5a9244d0bd4888e5b70912a35d01fceed4c899585c39543682e43e1a3

          SHA512

          7d454c1d92dd448dc9c5e00a2773bd141816aefeb0ae4ac509872db998d16889773b28753d0b02f7375631202f1d5986a18e3a67350d34741dcfc6f6c58a8775

        • C:\Users\Admin\AppData\Local\Temp\tmp5F40.tmp

          Filesize

          29KB

          MD5

          caa33738baf1f0908515f26f0e46afee

          SHA1

          2282a6e3345f00bb691e5b9daf81a839d1520d11

          SHA256

          735eac146ab456f34b40154082f2431660a821e3e3d54babe8e4898407bde4e1

          SHA512

          c91c2b295d4967eb0be7bd2413d8ff1149244591c4de80c8193e71edfcc412aee6579dd9c785b4e6a5f2f69bc270b7bbea71da0a39a4505313b453de4ffe66d2

        • C:\Users\Admin\AppData\Local\Temp\zincite.log

          Filesize

          288B

          MD5

          49c79961e3743087f8854f6a9570e9cf

          SHA1

          7220f4e3c7ad6d01aeb2f311b6963da96a84901f

          SHA256

          ab3489186be8e38ebc0744a3dec1c954197f82dca41e708892ae14da2d96b677

          SHA512

          60e3337b3042e2630efe30ba6df24bca064e1f65c1f56ff3cf4452fdd2f5449279cadf7db09d85fffa3efc188502e5ed9b90dd2ea5eff98c31194bbcefbeb047

        • C:\Users\Admin\AppData\Local\Temp\zincite.log

          Filesize

          288B

          MD5

          a4053f5b1cfdc6a86d7a3c2ec95805b7

          SHA1

          b018ace4abe4d42dc9799ecc80c95ba8a0c0f616

          SHA256

          0fbe1e1a4306e31474615d1205ff234a67fc8bb36df1a885e57b3591db51c13c

          SHA512

          f573761360538ebeca773ac6c5f8c40f0e311d48d4f4ee18f276893f38c31d5d19ee0f2ddc16e27188278b667b88769906dc273ad99a0b74f419cbead8ef4775

        • C:\Windows\services.exe

          Filesize

          8KB

          MD5

          b0fe74719b1b647e2056641931907f4a

          SHA1

          e858c206d2d1542a79936cb00d85da853bfc95e2

          SHA256

          bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

          SHA512

          9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

        • C:\Windows\services.exe

          Filesize

          8KB

          MD5

          b0fe74719b1b647e2056641931907f4a

          SHA1

          e858c206d2d1542a79936cb00d85da853bfc95e2

          SHA256

          bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

          SHA512

          9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

        • memory/3836-45-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/3836-23-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/3836-243-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/3836-35-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/3836-33-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/3836-28-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/3836-75-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/3836-40-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/3836-128-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/3836-278-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/3836-21-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/3836-16-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/3836-179-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/3836-15-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/3836-319-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/3836-5-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/4128-0-0x0000000000500000-0x0000000000510200-memory.dmp

          Filesize

          64KB

        • memory/4128-255-0x0000000000500000-0x0000000000510200-memory.dmp

          Filesize

          64KB

        • memory/4128-213-0x0000000000500000-0x0000000000510200-memory.dmp

          Filesize

          64KB

        • memory/4128-158-0x0000000000500000-0x0000000000510200-memory.dmp

          Filesize

          64KB

        • memory/4128-112-0x0000000000500000-0x0000000000510200-memory.dmp

          Filesize

          64KB

        • memory/4128-297-0x0000000000500000-0x0000000000510200-memory.dmp

          Filesize

          64KB

        • memory/4128-13-0x0000000000500000-0x0000000000510200-memory.dmp

          Filesize

          64KB

        • memory/4128-342-0x0000000000500000-0x0000000000510200-memory.dmp

          Filesize

          64KB