Analysis

  • max time kernel
    139s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2023 19:16

General

  • Target

    NEAS.f78134f3a7ec5ea0d37b8b41e0e8ca00.exe

  • Size

    386KB

  • MD5

    f78134f3a7ec5ea0d37b8b41e0e8ca00

  • SHA1

    4cc932148a80621af14ff3576119d745c9b8e48d

  • SHA256

    1a9c6fb2d281097f8956e60bc7893368881a42c1805c2228ae61fa2e8aaa7f31

  • SHA512

    63e6b544f8c4dafc4bcdf4eb3944387ef7a73c6cc84f135d8e99e7223601c839cc38277dc2875ca146ce17d925756c3e842389705c2a8b2040c45ef7ffaaeabe

  • SSDEEP

    6144:SejsEZ536R9stChkP7vYyuZ8dOtnGQbzlX6yKRmvHMxnGNB:SeAO53O3WR1donG2zVHKRbgB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.f78134f3a7ec5ea0d37b8b41e0e8ca00.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.f78134f3a7ec5ea0d37b8b41e0e8ca00.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:472
    • C:\Users\Admin\AppData\Local\Temp\NEAS.f78134f3a7ec5ea0d37b8b41e0e8ca00.exe
      C:\Users\Admin\AppData\Local\Temp\NEAS.f78134f3a7ec5ea0d37b8b41e0e8ca00.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\NEAS.f78134f3a7ec5ea0d37b8b41e0e8ca00.exe

    Filesize

    386KB

    MD5

    257dd54c2ba3335f0a5411ec0deaa963

    SHA1

    fe8bd7aeae0a107d347cfefe88ce5efeab7e4329

    SHA256

    4cd8c41025ec5258c6619800797291ad0c6a080697622095c03d95ed095a3b13

    SHA512

    f074fabbe69cf8843e5e9dfa169391681844bdbb8aa1e3e9e538f88c80fde0b062e6065b6ffd9e6f224e5e72f2aaba888815da42c318d951742bd3f175c79776

  • memory/472-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/472-1-0x00000000014D0000-0x0000000001536000-memory.dmp

    Filesize

    408KB

  • memory/472-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/472-11-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1680-13-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/1680-14-0x0000000000160000-0x00000000001C6000-memory.dmp

    Filesize

    408KB

  • memory/1680-20-0x0000000004EC0000-0x0000000004F1F000-memory.dmp

    Filesize

    380KB

  • memory/1680-21-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1680-31-0x000000000C640000-0x000000000C67C000-memory.dmp

    Filesize

    240KB

  • memory/1680-30-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1680-36-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB