Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
06-11-2023 22:08
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.10587f1e2a65083ec70c9a6ba5cbd720.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.10587f1e2a65083ec70c9a6ba5cbd720.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.10587f1e2a65083ec70c9a6ba5cbd720.exe
-
Size
27KB
-
MD5
10587f1e2a65083ec70c9a6ba5cbd720
-
SHA1
71b54d2d76a379b77b8c26b12905ebc5acb123b0
-
SHA256
2b503f1c2fa9bc1f20b5e033d1bce83512f8d061671effe506e995cb8fc155dd
-
SHA512
a68fa3a05cf6db2a5fbd7a35bebebad9fcaae258e16664fb514332c39216837dfb2921aafc558db5cd79a3f11bbeab2f7c2f5587807a94727e3d8e28f1ca51c6
-
SSDEEP
192:jn9FwXnwR2bsfunHMnHFb1emUAFoP7u1Y:zOnwR2tHMnHFAmhyqY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2340 hcbnaf.exe -
Loads dropped DLL 1 IoCs
pid Process 2368 NEAS.10587f1e2a65083ec70c9a6ba5cbd720.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2340 2368 NEAS.10587f1e2a65083ec70c9a6ba5cbd720.exe 28 PID 2368 wrote to memory of 2340 2368 NEAS.10587f1e2a65083ec70c9a6ba5cbd720.exe 28 PID 2368 wrote to memory of 2340 2368 NEAS.10587f1e2a65083ec70c9a6ba5cbd720.exe 28 PID 2368 wrote to memory of 2340 2368 NEAS.10587f1e2a65083ec70c9a6ba5cbd720.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.10587f1e2a65083ec70c9a6ba5cbd720.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.10587f1e2a65083ec70c9a6ba5cbd720.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\hcbnaf.exe"C:\Users\Admin\AppData\Local\Temp\hcbnaf.exe"2⤵
- Executes dropped EXE
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD58b66a690781e699f51055c3d4c3595ea
SHA1700f37402c276ee3d217e2ec5a55233ce01444c3
SHA2561fa42bf6dd0e3e0e373146d5c8bedb12f11493722343c729244ef03647743fa3
SHA512c5735744efb0e4f2304323488d1aa32e53331657611b9cd6031993f55fbba64d92d7fc1b4bf7529a0f61a0177a1596a49ec8589494f6799e874162a9163c31b5
-
Filesize
27KB
MD58b66a690781e699f51055c3d4c3595ea
SHA1700f37402c276ee3d217e2ec5a55233ce01444c3
SHA2561fa42bf6dd0e3e0e373146d5c8bedb12f11493722343c729244ef03647743fa3
SHA512c5735744efb0e4f2304323488d1aa32e53331657611b9cd6031993f55fbba64d92d7fc1b4bf7529a0f61a0177a1596a49ec8589494f6799e874162a9163c31b5
-
Filesize
27KB
MD58b66a690781e699f51055c3d4c3595ea
SHA1700f37402c276ee3d217e2ec5a55233ce01444c3
SHA2561fa42bf6dd0e3e0e373146d5c8bedb12f11493722343c729244ef03647743fa3
SHA512c5735744efb0e4f2304323488d1aa32e53331657611b9cd6031993f55fbba64d92d7fc1b4bf7529a0f61a0177a1596a49ec8589494f6799e874162a9163c31b5