Analysis
-
max time kernel
89s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
07-11-2023 19:47
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.070d3e7c2024c8d3a9a0c199b1dff460.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.070d3e7c2024c8d3a9a0c199b1dff460.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.070d3e7c2024c8d3a9a0c199b1dff460.exe
-
Size
124KB
-
MD5
070d3e7c2024c8d3a9a0c199b1dff460
-
SHA1
5fbb4f8cc5b886552fbd22281cd2f06ca025667f
-
SHA256
95d18273250967d6b0e3bddab377c8aac51b6c1094ea982add4af9317c9ef5d1
-
SHA512
c2f81c886fc11d29df7a3d3bddd650499b4614c34d80bf28af007f0c67237d28075633eb82cb83ceaff7123096b877725e53cba0bbe24d4cbfe0fec90d9bd681
-
SSDEEP
3072:Eq8f/oic1i9uTAlPQSDwEyWefHEvGdxETCpPJZ:78f/U1iF/sUGdxETI
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2644 NEAS.070d3e7c2024c8d3a9a0c199b1dff460.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2524 2644 NEAS.070d3e7c2024c8d3a9a0c199b1dff460.exe 29 PID 2644 wrote to memory of 2524 2644 NEAS.070d3e7c2024c8d3a9a0c199b1dff460.exe 29 PID 2644 wrote to memory of 2524 2644 NEAS.070d3e7c2024c8d3a9a0c199b1dff460.exe 29 PID 2644 wrote to memory of 2524 2644 NEAS.070d3e7c2024c8d3a9a0c199b1dff460.exe 29 PID 2524 wrote to memory of 1660 2524 cmd.exe 31 PID 2524 wrote to memory of 1660 2524 cmd.exe 31 PID 2524 wrote to memory of 1660 2524 cmd.exe 31 PID 2524 wrote to memory of 1660 2524 cmd.exe 31 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1660 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.070d3e7c2024c8d3a9a0c199b1dff460.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.070d3e7c2024c8d3a9a0c199b1dff460.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\aftB6E2.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\NEAS.070d3e7c2024c8d3a9a0c199b1dff460.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\NEAS.070d3e7c2024c8d3a9a0c199b1dff460.exe"3⤵
- Views/modifies file attributes
PID:1660
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51B
MD58d981805db2185e86413ffb085faab5d
SHA15b14397b28cd2c83ceac01297f85b831bc83281b
SHA256a2e1e0782cfbe4afffec937ca871df370eb8a70534311259017f11580db971b6
SHA51298a27811f4d1a828298153ccbadbac027aa03060ffd4a8060be0e354fbfd592ac438e0e124b0f22f8043c551a902d8d1d1aae5b838dde6a4ff39d13fa22c8b32
-
Filesize
51B
MD58d981805db2185e86413ffb085faab5d
SHA15b14397b28cd2c83ceac01297f85b831bc83281b
SHA256a2e1e0782cfbe4afffec937ca871df370eb8a70534311259017f11580db971b6
SHA51298a27811f4d1a828298153ccbadbac027aa03060ffd4a8060be0e354fbfd592ac438e0e124b0f22f8043c551a902d8d1d1aae5b838dde6a4ff39d13fa22c8b32