Analysis

  • max time kernel
    108s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    11/11/2023, 10:16

General

  • Target

    NEAS.d87f0b23857e8765e982d11410fe0a78.exe

  • Size

    267KB

  • MD5

    d87f0b23857e8765e982d11410fe0a78

  • SHA1

    08d5b644d1eddad1bc6a0004840f9e9c84b01281

  • SHA256

    172b2f44c0eb0902071c1f71601e67cb5e31d2408c22f42017660393bc3a4bba

  • SHA512

    939af514f11dc34d1d4dbb232c48f0ba4f6c5cb922caf75241f747a50ba41eaf9a359bcf14f8b8e85e82dd0b368158b3fd983826a28cd3f8b604d37c46e221de

  • SSDEEP

    3072:WcX93xwq19gL2SjGojCJa79TBfsY5vXWqvuHcYnLzqP2QA:WcNhJgX9z9TB0YRX8n6A

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.d87f0b23857e8765e982d11410fe0a78.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.d87f0b23857e8765e982d11410fe0a78.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2516
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev1E69.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.d87f0b23857e8765e982d11410fe0a78.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Users\Admin\AppData\Local\Temp\NEAS.D87F0B23857E8765E982D11410FE0A78.EXE
        3⤵
        • Sets service image path in registry
        • Executes dropped EXE
        • Suspicious behavior: LoadsDriver
        • Suspicious use of AdjustPrivilegeToken
        PID:932
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev1E69.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.D87F0B23857E8765E982D11410FE0A78.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2472

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\NEAS.D87F0B23857E8765E982D11410FE0A78.EXE

          Filesize

          267KB

          MD5

          27c5109568da06688c470611a5adfede

          SHA1

          e403bada2de78bf14fe8d09108a3a4d1e76751bd

          SHA256

          e8f6b904def07e6def7ffc15961f22a7e2e69c33dfd1f86c53599e0138661b79

          SHA512

          083166bf108d744df1cd338d932edb8401db7425abb25b0dbe5a1fe1ffbf8fa2c35006e2514bdf1e461b1a197edec9cc427f7e8490287025c7fa008c93211315

        • C:\Users\Admin\AppData\Local\Temp\NEAS.D87F0B23857E8765E982D11410FE0A78.EXE

          Filesize

          267KB

          MD5

          27c5109568da06688c470611a5adfede

          SHA1

          e403bada2de78bf14fe8d09108a3a4d1e76751bd

          SHA256

          e8f6b904def07e6def7ffc15961f22a7e2e69c33dfd1f86c53599e0138661b79

          SHA512

          083166bf108d744df1cd338d932edb8401db7425abb25b0dbe5a1fe1ffbf8fa2c35006e2514bdf1e461b1a197edec9cc427f7e8490287025c7fa008c93211315

        • C:\Users\Admin\AppData\Local\Temp\NEAS.d87f0b23857e8765e982d11410fe0a78.exe

          Filesize

          11KB

          MD5

          b5f8d0c67b41eb650ddf4cc59ce48cae

          SHA1

          288f7a4b88df49875f534313cb32bd974d3278dd

          SHA256

          a495a79d9640aa57b33850b0594b4477659fcb1aa754ce0f3867252a8966ba27

          SHA512

          fdaf1dc4f20893cfbd525ef27dc7f719133751df33ff17e95f9abe430f880c140e8874e8fb499e9f94fcb3505d178974e2474002afa0f7fbc8978a1e188df6d5

        • C:\Users\Admin\AppData\Local\Temp\NEAS.d87f0b23857e8765e982d11410fe0a78.exe

          Filesize

          11KB

          MD5

          b5f8d0c67b41eb650ddf4cc59ce48cae

          SHA1

          288f7a4b88df49875f534313cb32bd974d3278dd

          SHA256

          a495a79d9640aa57b33850b0594b4477659fcb1aa754ce0f3867252a8966ba27

          SHA512

          fdaf1dc4f20893cfbd525ef27dc7f719133751df33ff17e95f9abe430f880c140e8874e8fb499e9f94fcb3505d178974e2474002afa0f7fbc8978a1e188df6d5

        • C:\WINDOWS\MSWDM.EXE

          Filesize

          256KB

          MD5

          8a1198209520897514a2d82a912a66d2

          SHA1

          5dda8ec47f948814d808cd71e89ebe65940a1ff7

          SHA256

          5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

          SHA512

          9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

        • C:\Windows\MSWDM.EXE

          Filesize

          256KB

          MD5

          8a1198209520897514a2d82a912a66d2

          SHA1

          5dda8ec47f948814d808cd71e89ebe65940a1ff7

          SHA256

          5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

          SHA512

          9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

        • C:\Windows\MSWDM.EXE

          Filesize

          256KB

          MD5

          8a1198209520897514a2d82a912a66d2

          SHA1

          5dda8ec47f948814d808cd71e89ebe65940a1ff7

          SHA256

          5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

          SHA512

          9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

        • C:\Windows\MSWDM.EXE

          Filesize

          256KB

          MD5

          8a1198209520897514a2d82a912a66d2

          SHA1

          5dda8ec47f948814d808cd71e89ebe65940a1ff7

          SHA256

          5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

          SHA512

          9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

        • C:\Windows\MSWDM.EXE

          Filesize

          256KB

          MD5

          8a1198209520897514a2d82a912a66d2

          SHA1

          5dda8ec47f948814d808cd71e89ebe65940a1ff7

          SHA256

          5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

          SHA512

          9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

        • C:\Windows\dev1E69.tmp

          Filesize

          11KB

          MD5

          b5f8d0c67b41eb650ddf4cc59ce48cae

          SHA1

          288f7a4b88df49875f534313cb32bd974d3278dd

          SHA256

          a495a79d9640aa57b33850b0594b4477659fcb1aa754ce0f3867252a8966ba27

          SHA512

          fdaf1dc4f20893cfbd525ef27dc7f719133751df33ff17e95f9abe430f880c140e8874e8fb499e9f94fcb3505d178974e2474002afa0f7fbc8978a1e188df6d5

        • \Users\Admin\AppData\Local\Temp\NEAS.d87f0b23857e8765e982d11410fe0a78.exe

          Filesize

          11KB

          MD5

          b5f8d0c67b41eb650ddf4cc59ce48cae

          SHA1

          288f7a4b88df49875f534313cb32bd974d3278dd

          SHA256

          a495a79d9640aa57b33850b0594b4477659fcb1aa754ce0f3867252a8966ba27

          SHA512

          fdaf1dc4f20893cfbd525ef27dc7f719133751df33ff17e95f9abe430f880c140e8874e8fb499e9f94fcb3505d178974e2474002afa0f7fbc8978a1e188df6d5

        • \Users\Admin\AppData\Local\Temp\NEAS.d87f0b23857e8765e982d11410fe0a78.exe

          Filesize

          11KB

          MD5

          b5f8d0c67b41eb650ddf4cc59ce48cae

          SHA1

          288f7a4b88df49875f534313cb32bd974d3278dd

          SHA256

          a495a79d9640aa57b33850b0594b4477659fcb1aa754ce0f3867252a8966ba27

          SHA512

          fdaf1dc4f20893cfbd525ef27dc7f719133751df33ff17e95f9abe430f880c140e8874e8fb499e9f94fcb3505d178974e2474002afa0f7fbc8978a1e188df6d5

        • memory/932-24-0x0000000000400000-0x0000000000405000-memory.dmp

          Filesize

          20KB

        • memory/2660-17-0x00000000001B0000-0x00000000001B5000-memory.dmp

          Filesize

          20KB

        • memory/2660-22-0x00000000001B0000-0x00000000001B5000-memory.dmp

          Filesize

          20KB