Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2023 20:48
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.83a3fbb25da4aa7c33a6a710715539b0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.83a3fbb25da4aa7c33a6a710715539b0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.83a3fbb25da4aa7c33a6a710715539b0.exe
-
Size
386KB
-
MD5
83a3fbb25da4aa7c33a6a710715539b0
-
SHA1
57be9281398cae1e206068bff017e32ed54bdf63
-
SHA256
f75770ae11fc39383a69c9c3def0346933cc8249ce79e92d8773f67ff224e66c
-
SHA512
bff1064c534262fd830975252e99b259b00f53e39ed81203057e1cb84b4641df81e9190cdc5114093cf5cf0390a88dd4581094623d36bd4493a0ccc4998c73c4
-
SSDEEP
6144:JDn9/zJOFlEKX30AVzUCI+Zc4iTKhsp6swNjC/DcUiCWvkAjFMB:B9/1oEKXlIpTAGqNjKcUiCWkAjFMB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5084 NEAS.83a3fbb25da4aa7c33a6a710715539b0.exe -
Executes dropped EXE 1 IoCs
pid Process 5084 NEAS.83a3fbb25da4aa7c33a6a710715539b0.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1320 NEAS.83a3fbb25da4aa7c33a6a710715539b0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1320 NEAS.83a3fbb25da4aa7c33a6a710715539b0.exe 5084 NEAS.83a3fbb25da4aa7c33a6a710715539b0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1320 wrote to memory of 5084 1320 NEAS.83a3fbb25da4aa7c33a6a710715539b0.exe 85 PID 1320 wrote to memory of 5084 1320 NEAS.83a3fbb25da4aa7c33a6a710715539b0.exe 85 PID 1320 wrote to memory of 5084 1320 NEAS.83a3fbb25da4aa7c33a6a710715539b0.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.83a3fbb25da4aa7c33a6a710715539b0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.83a3fbb25da4aa7c33a6a710715539b0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\NEAS.83a3fbb25da4aa7c33a6a710715539b0.exeC:\Users\Admin\AppData\Local\Temp\NEAS.83a3fbb25da4aa7c33a6a710715539b0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
386KB
MD50c6dc1f392ee40420e15c72e128a74f5
SHA10240f7763ee742902ffbacaccc78a0dbf22036c4
SHA256286c6da094df9de17adf2c11e3b23c4b384093c00bc73f8593eded69bd26e353
SHA5125d83f8f01eab49680194d1020dc849383eea521088c2a2d311b3032e0a52ea77d1b695dc769f2d978df085fff2201b4fd3b2b621b8802fb5e7d56da68b856b63