Analysis
-
max time kernel
133s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2023 19:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.4b6b19d280e14e2c53a0a264b67dd040.exe
Resource
win7-20231023-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.4b6b19d280e14e2c53a0a264b67dd040.exe
Resource
win10v2004-20231023-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
NEAS.4b6b19d280e14e2c53a0a264b67dd040.exe
-
Size
1.3MB
-
MD5
4b6b19d280e14e2c53a0a264b67dd040
-
SHA1
24a9b42cd74882edfb6beb32779e24813f37b12f
-
SHA256
7320672c2e02fbd93a84806ed1e534d517c9da71feeffecbd6d90e7780086c59
-
SHA512
c5964a134a1fd7b7215c39df05cf20b2644721276d167f8f7cb06ea30aa91acba617866b17c9abb20b60f35bf8baeb9359bece7cba9285335cda583c30169f88
-
SSDEEP
24576:Gb5kSYaLTVt2aIw3zWcwzw90BTbmPSROCWTbvuoG0wzujF4jMxtJTKf8aabQrns2:Gb5k2L5QaIUWc6w9aTlRPWTLs0wyjCjb
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4840 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1080 NEAS.4b6b19d280e14e2c53a0a264b67dd040.exe 1080 NEAS.4b6b19d280e14e2c53a0a264b67dd040.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1080 NEAS.4b6b19d280e14e2c53a0a264b67dd040.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1080 wrote to memory of 4100 1080 NEAS.4b6b19d280e14e2c53a0a264b67dd040.exe 87 PID 1080 wrote to memory of 4100 1080 NEAS.4b6b19d280e14e2c53a0a264b67dd040.exe 87 PID 4100 wrote to memory of 4840 4100 cmd.exe 89 PID 4100 wrote to memory of 4840 4100 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.4b6b19d280e14e2c53a0a264b67dd040.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.4b6b19d280e14e2c53a0a264b67dd040.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\NEAS.4b6b19d280e14e2c53a0a264b67dd040.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:4840
-
-