Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2023 15:05

General

  • Target

    NEAS.10fa976229429956070b1c3f04e245e1.exe

  • Size

    6.9MB

  • MD5

    10fa976229429956070b1c3f04e245e1

  • SHA1

    6210538cbbd9c9638541ee9afc04e82f6f23017e

  • SHA256

    694e96dc16114b2413c442ef8ec159f3a03e2e2f609785e63054c3b5e2758b4d

  • SHA512

    ec947abb4cdf58390ad41eb47d2e066394d6e4a654f8b2c3c3df0c6c93033b5d1f8b770506311b1768d7fdcb8824e520d49ca9c0b1b7eb7b91a5d5a36f2f4e07

  • SSDEEP

    196608:bf7HTjPBz4KkAYcDz7yhGbbRZvZUE0F6lagttgw:/Hv6yprvRZeGPj

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.10fa976229429956070b1c3f04e245e1.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.10fa976229429956070b1c3f04e245e1.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:2728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCXD629.tmp

    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\7z.exe

    Filesize

    7.0MB

    MD5

    8877bfdc1c9ff4329e8afe6c88a0edd4

    SHA1

    359fe0e347168d9879f9ee8162936c58e9bec37b

    SHA256

    c5f1a4c193aeadfd74de0371cbf8288b3d8ca16a3cc21cc9824ad247bc5667f0

    SHA512

    7a067145094a06f210a67c54ce377ddbeab909474df84929d2a1af5beb96bafac2386716f4b0cf31b1966b4574f8b4ed0cbb84de11a6e655072e7bf26fbf4848

  • memory/2728-23-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2728-109-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2728-21-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2728-24-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2728-25-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2728-26-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2728-20-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2728-22-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2728-110-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2728-111-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2728-112-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2728-113-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2728-114-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2728-115-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB