Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 00:01
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2269f5822f8f7a814b896e7cadfa18b0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2269f5822f8f7a814b896e7cadfa18b0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.2269f5822f8f7a814b896e7cadfa18b0.exe
-
Size
506KB
-
MD5
2269f5822f8f7a814b896e7cadfa18b0
-
SHA1
dcaaf487cffe3d132cf37d78685e03125b08e79d
-
SHA256
415a34c5db89a2da381b80dcab8f83ed9fd6f7b01c0fd06843fcab7aaf2119fa
-
SHA512
9415fee92a2f0864c6183afdef6b225ba6a5fbcf59a37bb2d96ec5c1a43f05cc7b3dbce1e3420071ea50b66fcd59367d1f67e36fb01aedb4f53ef61a8ddd6842
-
SSDEEP
12288:RSzNykO66/lr0cmUqW+JMcurt/wpRuQhIaZPAk8MenjFs9Mv8mJ:RwNdOR/l4ZWFVrZqgjFimJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1744 NEAS.2269f5822f8f7a814b896e7cadfa18b0.exe -
Executes dropped EXE 1 IoCs
pid Process 1744 NEAS.2269f5822f8f7a814b896e7cadfa18b0.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1744 NEAS.2269f5822f8f7a814b896e7cadfa18b0.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2164 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1744 NEAS.2269f5822f8f7a814b896e7cadfa18b0.exe 1744 NEAS.2269f5822f8f7a814b896e7cadfa18b0.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4224 NEAS.2269f5822f8f7a814b896e7cadfa18b0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4224 NEAS.2269f5822f8f7a814b896e7cadfa18b0.exe 1744 NEAS.2269f5822f8f7a814b896e7cadfa18b0.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4224 wrote to memory of 1744 4224 NEAS.2269f5822f8f7a814b896e7cadfa18b0.exe 86 PID 4224 wrote to memory of 1744 4224 NEAS.2269f5822f8f7a814b896e7cadfa18b0.exe 86 PID 4224 wrote to memory of 1744 4224 NEAS.2269f5822f8f7a814b896e7cadfa18b0.exe 86 PID 1744 wrote to memory of 2164 1744 NEAS.2269f5822f8f7a814b896e7cadfa18b0.exe 88 PID 1744 wrote to memory of 2164 1744 NEAS.2269f5822f8f7a814b896e7cadfa18b0.exe 88 PID 1744 wrote to memory of 2164 1744 NEAS.2269f5822f8f7a814b896e7cadfa18b0.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2269f5822f8f7a814b896e7cadfa18b0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2269f5822f8f7a814b896e7cadfa18b0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\NEAS.2269f5822f8f7a814b896e7cadfa18b0.exeC:\Users\Admin\AppData\Local\Temp\NEAS.2269f5822f8f7a814b896e7cadfa18b0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\NEAS.2269f5822f8f7a814b896e7cadfa18b0.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2164
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD5815841215062c9dca7ca905492aecf0d
SHA1afc04e802b601075ef4a8f6e62f24b447fcdc80c
SHA25655f16f6f9296627a3a107cca043fb40f1a3c1e3ea6907267184284950a3b3a28
SHA512a4236c979bd356538c07400025dedcfe635d71c6aac3ab86e0caca9c05463fa0fac380d26e41c00db8a443f91eab0ad45e3ad8b1e69a387493e439d10a441a09