Analysis

  • max time kernel
    134s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/11/2023, 09:59

General

  • Target

    NEAS.0168eb70f996266b80de42aea1684e25.exe

  • Size

    666KB

  • MD5

    0168eb70f996266b80de42aea1684e25

  • SHA1

    bc929f0a91cdbadef91691f241f9fc9a2517e759

  • SHA256

    8fd5422b11e30fc88c25ecf70eeea184d85fef94fb85285852fac2a4ef5d1f58

  • SHA512

    999f75c13eeb3f1c4cbdf0da5f1ade54898e5c79e35003cd7ce3c34c1a1fe37af9fca95cab47c29258617b296017cee13de05f67c2e9f2c99bb94af379295938

  • SSDEEP

    3072:H+ZvkWp8qX96QfCDpMqrT4GmdVM3bXKCKk3T1a/PTYhA7Jf22QA6Ivv1tH/nSrNF:eZmqt6Qyiy3b6CR10TY8JOArF9S9

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.0168eb70f996266b80de42aea1684e25.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.0168eb70f996266b80de42aea1684e25.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:4416
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:4276

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\drivers32\Tomb Raider - The Angel of Darkness No-Cd Crack.exe

      Filesize

      666KB

      MD5

      0168eb70f996266b80de42aea1684e25

      SHA1

      bc929f0a91cdbadef91691f241f9fc9a2517e759

      SHA256

      8fd5422b11e30fc88c25ecf70eeea184d85fef94fb85285852fac2a4ef5d1f58

      SHA512

      999f75c13eeb3f1c4cbdf0da5f1ade54898e5c79e35003cd7ce3c34c1a1fe37af9fca95cab47c29258617b296017cee13de05f67c2e9f2c99bb94af379295938

    • \??\c:\$$$$$.bat

      Filesize

      210B

      MD5

      76afef18cfa0d9d3f0a0d7b986f5cbe6

      SHA1

      e421f8164d54cd58d326d2eb0bdf04e01aa0bf66

      SHA256

      21c8439406f8736905b250c15bdf331bfdedef6c85cc45e6f8952ecc5a2dc27e

      SHA512

      d2d9cada459bd611f56465c7f932c53e87625a35bf53c1333355e6c515f328901906bc153c019582973e6bd7ae63669cf308d7e937fbeacd215097d9dfc4129f

    • memory/4416-0-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4416-482-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4416-821-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB