Analysis

  • max time kernel
    133s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2023 20:49

General

  • Target

    NEAS.c4d5b0f83f93d6dacb8bd726827f0cf0.exe

  • Size

    225KB

  • MD5

    c4d5b0f83f93d6dacb8bd726827f0cf0

  • SHA1

    7c6a084af3cf2724ef84c9bb9e51dd9aabf38606

  • SHA256

    cae4feb5ff1d25d538ae0c123080d97384c9bf018ca3b640ef59f66ab6366b72

  • SHA512

    ffd7674bc9873ee68978aeb18b53b411a76bac344b520fdb7c6f641ff6494b8ab73e11019a9b3667848909eb95918a984b5958a37967138cc7586c76e3d54e9c

  • SSDEEP

    3072:+U7JHh2QdP8cIlt4ZpzGv/dFRa1C8gVcF3Cdic1h6qFs3DXwUSxgaYvQd2x:zFwmoIqnrRwVHF3H6h60wDAKNx

Score
8/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.c4d5b0f83f93d6dacb8bd726827f0cf0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.c4d5b0f83f93d6dacb8bd726827f0cf0.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4944
  • C:\PROGRA~3\Mozilla\axfniqh.exe
    C:\PROGRA~3\Mozilla\axfniqh.exe -pdtylqd
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:1732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\axfniqh.exe

    Filesize

    225KB

    MD5

    1f2d95abb48be452c5ce7ddae7d861aa

    SHA1

    18c7092fe120159fbed408de50ab9a243d5571f7

    SHA256

    2e98e9d917e74c6c159464caf60a03dd141dba3814f9e3e563a427c4c59c5bd1

    SHA512

    1f6c38bb9dc009e09a1cf12b0f171fb6b75aafc2c7179f9a164ec9a0e04e4e70e50720cac637350fbd536600f969301aeb8a1b379d021413a4e3d6e800271793

  • C:\ProgramData\Mozilla\axfniqh.exe

    Filesize

    225KB

    MD5

    1f2d95abb48be452c5ce7ddae7d861aa

    SHA1

    18c7092fe120159fbed408de50ab9a243d5571f7

    SHA256

    2e98e9d917e74c6c159464caf60a03dd141dba3814f9e3e563a427c4c59c5bd1

    SHA512

    1f6c38bb9dc009e09a1cf12b0f171fb6b75aafc2c7179f9a164ec9a0e04e4e70e50720cac637350fbd536600f969301aeb8a1b379d021413a4e3d6e800271793

  • memory/1732-12-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/1732-11-0x0000000000D80000-0x0000000000DDB000-memory.dmp

    Filesize

    364KB

  • memory/1732-15-0x0000000000D80000-0x0000000000DDB000-memory.dmp

    Filesize

    364KB

  • memory/1732-16-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/1732-18-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/4944-4-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/4944-5-0x00000000021E0000-0x000000000223B000-memory.dmp

    Filesize

    364KB

  • memory/4944-2-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/4944-1-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/4944-8-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/4944-0-0x00000000021E0000-0x000000000223B000-memory.dmp

    Filesize

    364KB