Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 01:24
Behavioral task
behavioral1
Sample
NEAS.05ae8ed08b609356d0c195bc6fec48f0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.05ae8ed08b609356d0c195bc6fec48f0.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.05ae8ed08b609356d0c195bc6fec48f0.exe
-
Size
58KB
-
MD5
05ae8ed08b609356d0c195bc6fec48f0
-
SHA1
a2dbbe1e4513277f2a0221c6950d917c7000c344
-
SHA256
9f4fdb17e23007f5a2e1ae3c3fd2a75b0faeb1aec2eabb8306172661d5f64b97
-
SHA512
8eac0291bbe7a41e7699539ea356c619918869e99b44947cd2b215c000054d1a1c899aed29ede14f46de40d57269aef3fb4cc45471d45e0b80eb8343edf40a22
-
SSDEEP
1536:tHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVtLl8k:tHoLde/OgV432UcP39hXJZn5Z
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4564-0-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/files/0x0006000000022e10-5.dat upx behavioral2/memory/4564-102-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe NEAS.05ae8ed08b609356d0c195bc6fec48f0.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD505ae8ed08b609356d0c195bc6fec48f0
SHA1a2dbbe1e4513277f2a0221c6950d917c7000c344
SHA2569f4fdb17e23007f5a2e1ae3c3fd2a75b0faeb1aec2eabb8306172661d5f64b97
SHA5128eac0291bbe7a41e7699539ea356c619918869e99b44947cd2b215c000054d1a1c899aed29ede14f46de40d57269aef3fb4cc45471d45e0b80eb8343edf40a22