Analysis
-
max time kernel
118s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
12-11-2023 22:42
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.717123652bb5671b3a0989af138e0550.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.717123652bb5671b3a0989af138e0550.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.717123652bb5671b3a0989af138e0550.exe
-
Size
136KB
-
MD5
717123652bb5671b3a0989af138e0550
-
SHA1
7e4ef85b1cc83219b0b7a427ec525b3cbf6ed88d
-
SHA256
d2ec599e9e2ac77069508ede2e78df73e21430493765fd14ed648cedc272fd5b
-
SHA512
edc265c9fc38f78fce47653a9acdd90dde8cd49e4836c78a35d5f6dbbe342e0e957117fa6bdcaa77f144761c989a94c654725965d4f539f7b5c730f28133f500
-
SSDEEP
3072:86pQc+sSxnTrGadgsFqZeo4pwkhUmZr3hPsOraSo:86p2sSxTrGvsFUejWyZr3hPswaH
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1696 NEAS.717123652bb5671b3a0989af138e0550.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1688 1696 NEAS.717123652bb5671b3a0989af138e0550.exe 28 PID 1696 wrote to memory of 1688 1696 NEAS.717123652bb5671b3a0989af138e0550.exe 28 PID 1696 wrote to memory of 1688 1696 NEAS.717123652bb5671b3a0989af138e0550.exe 28 PID 1696 wrote to memory of 1688 1696 NEAS.717123652bb5671b3a0989af138e0550.exe 28 PID 1688 wrote to memory of 2660 1688 cmd.exe 30 PID 1688 wrote to memory of 2660 1688 cmd.exe 30 PID 1688 wrote to memory of 2660 1688 cmd.exe 30 PID 1688 wrote to memory of 2660 1688 cmd.exe 30 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2660 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.717123652bb5671b3a0989af138e0550.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.717123652bb5671b3a0989af138e0550.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ProgramData\fra3C19.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\NEAS.717123652bb5671b3a0989af138e0550.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\NEAS.717123652bb5671b3a0989af138e0550.exe"3⤵
- Views/modifies file attributes
PID:2660
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51B
MD5d55a30c847e4486ed375342ef6bfbe30
SHA1218dbe3961a4764529b4021a5c6d68c0bb6d72f4
SHA256660cded74c97e51cbc71300f0159940f04a97d8e8641bd58008125ecdc57d898
SHA512ea27d49a5c11f186f59aceb773407c6e6463566c8ee7e1e8f470035e715a5ed592a3f3157012c3fcdd1d914ca9f060d47e89bbb3ebe81b5f081e82f27f415d9b
-
Filesize
51B
MD5d55a30c847e4486ed375342ef6bfbe30
SHA1218dbe3961a4764529b4021a5c6d68c0bb6d72f4
SHA256660cded74c97e51cbc71300f0159940f04a97d8e8641bd58008125ecdc57d898
SHA512ea27d49a5c11f186f59aceb773407c6e6463566c8ee7e1e8f470035e715a5ed592a3f3157012c3fcdd1d914ca9f060d47e89bbb3ebe81b5f081e82f27f415d9b