Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    12/11/2023, 22:38

General

  • Target

    NEAS.4df0c17d95dcd3b06d2b6c3125bd5480.exe

  • Size

    189KB

  • MD5

    4df0c17d95dcd3b06d2b6c3125bd5480

  • SHA1

    ca01cac80b5b01e41875cd49ed09e65ec759b126

  • SHA256

    2d62dd5d5a76d34fe015d8f8c3a368f27e66122c7a5648c01c98e78fd2cec616

  • SHA512

    807781313b9862fab50f4999b41237d111cdaaafd272344b3af23557267f4377c322ca3155ee149eae154c3072452624ea87eeeee47d54a5396f19adfa26309d

  • SSDEEP

    3072:RYG/aOpxe/FC7MqzID1xt1lDZaGUC19DFjh2JptWhCw3BDR:KnKyC7MBn6sZh4bQ53BDR

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.4df0c17d95dcd3b06d2b6c3125bd5480.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.4df0c17d95dcd3b06d2b6c3125bd5480.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2788
    • C:\Users\Admin\AppData\Local\Temp\NEAS.4df0c17d95dcd3b06d2b6c3125bd5480.exe
      C:\Users\Admin\AppData\Local\Temp\NEAS.4df0c17d95dcd3b06d2b6c3125bd5480.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of UnmapMainImage
      PID:2844

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\NEAS.4df0c17d95dcd3b06d2b6c3125bd5480.exe

    Filesize

    189KB

    MD5

    5a370fb7bb7028d07ea29e6cc15d335a

    SHA1

    0680d1d0dacf8f4ce08ffb77fc7c44783d6d2d34

    SHA256

    8c6ddd25d60420a0d89c75cf2a5444865b28021f0910849df8f633219ac00d6c

    SHA512

    f6b0d65ba801fa6d9c0f909c6fec3f10d0fa5399c9887e2837cf7d868ed5b89381280abe69e7374aca8018c667f53f8546d260efd1ec9768b846fa7236084fad

  • \Users\Admin\AppData\Local\Temp\NEAS.4df0c17d95dcd3b06d2b6c3125bd5480.exe

    Filesize

    189KB

    MD5

    5a370fb7bb7028d07ea29e6cc15d335a

    SHA1

    0680d1d0dacf8f4ce08ffb77fc7c44783d6d2d34

    SHA256

    8c6ddd25d60420a0d89c75cf2a5444865b28021f0910849df8f633219ac00d6c

    SHA512

    f6b0d65ba801fa6d9c0f909c6fec3f10d0fa5399c9887e2837cf7d868ed5b89381280abe69e7374aca8018c667f53f8546d260efd1ec9768b846fa7236084fad

  • memory/2788-0-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2788-9-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2788-5-0x0000000000310000-0x000000000034C000-memory.dmp

    Filesize

    240KB

  • memory/2844-11-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2844-12-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2844-13-0x0000000000130000-0x000000000016C000-memory.dmp

    Filesize

    240KB