Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
12-11-2023 21:38
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.efa1c7b0dce7449656023413e84161b0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.efa1c7b0dce7449656023413e84161b0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.efa1c7b0dce7449656023413e84161b0.exe
-
Size
37KB
-
MD5
efa1c7b0dce7449656023413e84161b0
-
SHA1
b002f8fb908685489ec883d6a33f65264d41e0c8
-
SHA256
5fc572c04945a3b9e21dcf4a52f4cceffedc437b151a9fb882220b8cec24f598
-
SHA512
a77057c3586ec3b3a371f038bc39b4f710c222fbccedcdf0711cbb9ab2e296eb996521cd0956544ce6646cce042f1e6df23efda577ab39403a837b20f0a00793
-
SSDEEP
768:cSPMaRx4WOz2olOPQOl23aeh23J8ar9SUDWT0H5qHS6zG9VBuUJRnyab:jMaAWOz2YOFw3ae4ptaq5qHSlTBuTab
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2136 Un_A.exe -
Loads dropped DLL 1 IoCs
pid Process 1612 NEAS.efa1c7b0dce7449656023413e84161b0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2136 Un_A.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2136 1612 NEAS.efa1c7b0dce7449656023413e84161b0.exe 21 PID 1612 wrote to memory of 2136 1612 NEAS.efa1c7b0dce7449656023413e84161b0.exe 21 PID 1612 wrote to memory of 2136 1612 NEAS.efa1c7b0dce7449656023413e84161b0.exe 21 PID 1612 wrote to memory of 2136 1612 NEAS.efa1c7b0dce7449656023413e84161b0.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.efa1c7b0dce7449656023413e84161b0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.efa1c7b0dce7449656023413e84161b0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5efa1c7b0dce7449656023413e84161b0
SHA1b002f8fb908685489ec883d6a33f65264d41e0c8
SHA2565fc572c04945a3b9e21dcf4a52f4cceffedc437b151a9fb882220b8cec24f598
SHA512a77057c3586ec3b3a371f038bc39b4f710c222fbccedcdf0711cbb9ab2e296eb996521cd0956544ce6646cce042f1e6df23efda577ab39403a837b20f0a00793
-
Filesize
37KB
MD5efa1c7b0dce7449656023413e84161b0
SHA1b002f8fb908685489ec883d6a33f65264d41e0c8
SHA2565fc572c04945a3b9e21dcf4a52f4cceffedc437b151a9fb882220b8cec24f598
SHA512a77057c3586ec3b3a371f038bc39b4f710c222fbccedcdf0711cbb9ab2e296eb996521cd0956544ce6646cce042f1e6df23efda577ab39403a837b20f0a00793
-
Filesize
37KB
MD5efa1c7b0dce7449656023413e84161b0
SHA1b002f8fb908685489ec883d6a33f65264d41e0c8
SHA2565fc572c04945a3b9e21dcf4a52f4cceffedc437b151a9fb882220b8cec24f598
SHA512a77057c3586ec3b3a371f038bc39b4f710c222fbccedcdf0711cbb9ab2e296eb996521cd0956544ce6646cce042f1e6df23efda577ab39403a837b20f0a00793