Analysis

  • max time kernel
    118s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    12/11/2023, 20:40

General

  • Target

    NEAS.3a55e3735433706e8f3aab4ef8d86ad0.exe

  • Size

    944KB

  • MD5

    3a55e3735433706e8f3aab4ef8d86ad0

  • SHA1

    f812a8cb4d40cf2358e71bce8fc7bb23298c6276

  • SHA256

    7a769a77cc081580100b0c865a20dd8ecffb7667275b180115a7bcee0943c70e

  • SHA512

    ed7079c9b4a2af53691482db292ac81d571038a4c12b299257a062ab26b830d8c1a0fc07968fa56b1d6cfcfc7a023412f36a59278c5fe8a004c2a4f949aa4d90

  • SSDEEP

    6144:kXoNoStDSV7W0D1gLBxWRBTWyrQYVh3U+L777s7U7fhAJOeyje+WofQrmL4hUOzh:pNNk7dWBGtrlLEr7pUdejVDa/ZSZD

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.3a55e3735433706e8f3aab4ef8d86ad0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.3a55e3735433706e8f3aab4ef8d86ad0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\NEAS.3a55e3735433706e8f3aab4ef8d86ad0.exe
      C:\Users\Admin\AppData\Local\Temp\NEAS.3a55e3735433706e8f3aab4ef8d86ad0.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:3056
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 144
    1⤵
    • Loads dropped DLL
    • Program crash
    PID:2688

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\NEAS.3a55e3735433706e8f3aab4ef8d86ad0.exe

          Filesize

          944KB

          MD5

          4471a0787268b30c894c72f0ba2aa071

          SHA1

          1cea0a9f5b13432ff67ec07a94f278d6d2e63575

          SHA256

          ca7e89fce58b5c50aedfd62ae4d6518921455cc39dd24369cb6fc0d58c233a1e

          SHA512

          d04af54f771327a28dfae536edc418306531fc85d678f1411403f7947a9a96e4e6c6702fc22a058a75def013ecff978508355cb4f9057343718db8165be56b9e

        • C:\Users\Admin\AppData\Local\Temp\NEAS.3a55e3735433706e8f3aab4ef8d86ad0.exe

          Filesize

          944KB

          MD5

          4471a0787268b30c894c72f0ba2aa071

          SHA1

          1cea0a9f5b13432ff67ec07a94f278d6d2e63575

          SHA256

          ca7e89fce58b5c50aedfd62ae4d6518921455cc39dd24369cb6fc0d58c233a1e

          SHA512

          d04af54f771327a28dfae536edc418306531fc85d678f1411403f7947a9a96e4e6c6702fc22a058a75def013ecff978508355cb4f9057343718db8165be56b9e

        • \Users\Admin\AppData\Local\Temp\NEAS.3a55e3735433706e8f3aab4ef8d86ad0.exe

          Filesize

          944KB

          MD5

          4471a0787268b30c894c72f0ba2aa071

          SHA1

          1cea0a9f5b13432ff67ec07a94f278d6d2e63575

          SHA256

          ca7e89fce58b5c50aedfd62ae4d6518921455cc39dd24369cb6fc0d58c233a1e

          SHA512

          d04af54f771327a28dfae536edc418306531fc85d678f1411403f7947a9a96e4e6c6702fc22a058a75def013ecff978508355cb4f9057343718db8165be56b9e

        • \Users\Admin\AppData\Local\Temp\NEAS.3a55e3735433706e8f3aab4ef8d86ad0.exe

          Filesize

          944KB

          MD5

          4471a0787268b30c894c72f0ba2aa071

          SHA1

          1cea0a9f5b13432ff67ec07a94f278d6d2e63575

          SHA256

          ca7e89fce58b5c50aedfd62ae4d6518921455cc39dd24369cb6fc0d58c233a1e

          SHA512

          d04af54f771327a28dfae536edc418306531fc85d678f1411403f7947a9a96e4e6c6702fc22a058a75def013ecff978508355cb4f9057343718db8165be56b9e

        • \Users\Admin\AppData\Local\Temp\NEAS.3a55e3735433706e8f3aab4ef8d86ad0.exe

          Filesize

          944KB

          MD5

          4471a0787268b30c894c72f0ba2aa071

          SHA1

          1cea0a9f5b13432ff67ec07a94f278d6d2e63575

          SHA256

          ca7e89fce58b5c50aedfd62ae4d6518921455cc39dd24369cb6fc0d58c233a1e

          SHA512

          d04af54f771327a28dfae536edc418306531fc85d678f1411403f7947a9a96e4e6c6702fc22a058a75def013ecff978508355cb4f9057343718db8165be56b9e

        • \Users\Admin\AppData\Local\Temp\NEAS.3a55e3735433706e8f3aab4ef8d86ad0.exe

          Filesize

          944KB

          MD5

          4471a0787268b30c894c72f0ba2aa071

          SHA1

          1cea0a9f5b13432ff67ec07a94f278d6d2e63575

          SHA256

          ca7e89fce58b5c50aedfd62ae4d6518921455cc39dd24369cb6fc0d58c233a1e

          SHA512

          d04af54f771327a28dfae536edc418306531fc85d678f1411403f7947a9a96e4e6c6702fc22a058a75def013ecff978508355cb4f9057343718db8165be56b9e

        • memory/3016-0-0x0000000000400000-0x00000000004EC000-memory.dmp

          Filesize

          944KB

        • memory/3016-8-0x0000000002FA0000-0x000000000308C000-memory.dmp

          Filesize

          944KB

        • memory/3016-7-0x0000000000400000-0x00000000004EC000-memory.dmp

          Filesize

          944KB

        • memory/3056-11-0x0000000002CF0000-0x0000000002DDC000-memory.dmp

          Filesize

          944KB

        • memory/3056-10-0x0000000000400000-0x00000000004EC000-memory.dmp

          Filesize

          944KB