Analysis
-
max time kernel
75s -
max time network
26s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
07-11-2023 19:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.4b6b19d280e14e2c53a0a264b67dd040.exe
Resource
win7-20231023-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.4b6b19d280e14e2c53a0a264b67dd040.exe
Resource
win10v2004-20231023-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
NEAS.4b6b19d280e14e2c53a0a264b67dd040.exe
-
Size
1.3MB
-
MD5
4b6b19d280e14e2c53a0a264b67dd040
-
SHA1
24a9b42cd74882edfb6beb32779e24813f37b12f
-
SHA256
7320672c2e02fbd93a84806ed1e534d517c9da71feeffecbd6d90e7780086c59
-
SHA512
c5964a134a1fd7b7215c39df05cf20b2644721276d167f8f7cb06ea30aa91acba617866b17c9abb20b60f35bf8baeb9359bece7cba9285335cda583c30169f88
-
SSDEEP
24576:Gb5kSYaLTVt2aIw3zWcwzw90BTbmPSROCWTbvuoG0wzujF4jMxtJTKf8aabQrns2:Gb5k2L5QaIUWc6w9aTlRPWTLs0wyjCjb
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2816 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2552 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2648 NEAS.4b6b19d280e14e2c53a0a264b67dd040.exe 2648 NEAS.4b6b19d280e14e2c53a0a264b67dd040.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2648 NEAS.4b6b19d280e14e2c53a0a264b67dd040.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2816 2648 NEAS.4b6b19d280e14e2c53a0a264b67dd040.exe 29 PID 2648 wrote to memory of 2816 2648 NEAS.4b6b19d280e14e2c53a0a264b67dd040.exe 29 PID 2648 wrote to memory of 2816 2648 NEAS.4b6b19d280e14e2c53a0a264b67dd040.exe 29 PID 2816 wrote to memory of 2552 2816 cmd.exe 31 PID 2816 wrote to memory of 2552 2816 cmd.exe 31 PID 2816 wrote to memory of 2552 2816 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.4b6b19d280e14e2c53a0a264b67dd040.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.4b6b19d280e14e2c53a0a264b67dd040.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\NEAS.4b6b19d280e14e2c53a0a264b67dd040.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2552
-
-