Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
12/11/2023, 20:47
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.dda96f68a625b1fa465cb05ae6e834e0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.dda96f68a625b1fa465cb05ae6e834e0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.dda96f68a625b1fa465cb05ae6e834e0.exe
-
Size
165KB
-
MD5
dda96f68a625b1fa465cb05ae6e834e0
-
SHA1
26ccba39c29d37ffa3f92b015c12869c17ad0824
-
SHA256
e6e38b05a6d3070066a0737ae6ffa4023c964d84c995a56c3f2f98a09ab84a49
-
SHA512
609ab1c830df7a871aaa304b36b9404ea671ea8652edd34b7e0705e97aeca4eafd4532cf754365a447919f9156958069884707f4d6fa741568264f7efc28c71d
-
SSDEEP
3072:A4HCWau/PlYeuL7ZLFh6Ca6cbL9l2hzB3fJCC6j8+Er6ez4f:fiI/PlY37ZLF4Ca6WABqBOvs
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1452 ins4657.exe -
Loads dropped DLL 4 IoCs
pid Process 2544 NEAS.dda96f68a625b1fa465cb05ae6e834e0.exe 2544 NEAS.dda96f68a625b1fa465cb05ae6e834e0.exe 2544 NEAS.dda96f68a625b1fa465cb05ae6e834e0.exe 2544 NEAS.dda96f68a625b1fa465cb05ae6e834e0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1452 ins4657.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1452 ins4657.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1452 ins4657.exe 1452 ins4657.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2544 wrote to memory of 1452 2544 NEAS.dda96f68a625b1fa465cb05ae6e834e0.exe 28 PID 2544 wrote to memory of 1452 2544 NEAS.dda96f68a625b1fa465cb05ae6e834e0.exe 28 PID 2544 wrote to memory of 1452 2544 NEAS.dda96f68a625b1fa465cb05ae6e834e0.exe 28 PID 2544 wrote to memory of 1452 2544 NEAS.dda96f68a625b1fa465cb05ae6e834e0.exe 28 PID 2544 wrote to memory of 1452 2544 NEAS.dda96f68a625b1fa465cb05ae6e834e0.exe 28 PID 2544 wrote to memory of 1452 2544 NEAS.dda96f68a625b1fa465cb05ae6e834e0.exe 28 PID 2544 wrote to memory of 1452 2544 NEAS.dda96f68a625b1fa465cb05ae6e834e0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.dda96f68a625b1fa465cb05ae6e834e0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.dda96f68a625b1fa465cb05ae6e834e0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\ins4657\ins4657.exe"C:\Users\Admin\AppData\Local\Temp\ins4657\ins4657.exe" ins.exe /e4353016 /u503b75ba-8abc-4f1f-82fb-56ec5bc06f2f2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257KB
MD5ae117f47bd80e5dcf72cf81347fceb73
SHA11cd3e4c5fc9fb317b7a8eae6c94d53078800b635
SHA25649b0ec8a4000cb30f15b318bef4b6f59be2d0f7365be4c4b2b4fd5607e16e23c
SHA51272d322ec9b13e9ede1967707129f2941328ec75487aa5ea205eab0780ef26c33f253204ce08932052a6ed19d13bd62e68b4f795ef17717b9f31e5a76a9f0c16f
-
Filesize
257KB
MD5ae117f47bd80e5dcf72cf81347fceb73
SHA11cd3e4c5fc9fb317b7a8eae6c94d53078800b635
SHA25649b0ec8a4000cb30f15b318bef4b6f59be2d0f7365be4c4b2b4fd5607e16e23c
SHA51272d322ec9b13e9ede1967707129f2941328ec75487aa5ea205eab0780ef26c33f253204ce08932052a6ed19d13bd62e68b4f795ef17717b9f31e5a76a9f0c16f
-
Filesize
257KB
MD5ae117f47bd80e5dcf72cf81347fceb73
SHA11cd3e4c5fc9fb317b7a8eae6c94d53078800b635
SHA25649b0ec8a4000cb30f15b318bef4b6f59be2d0f7365be4c4b2b4fd5607e16e23c
SHA51272d322ec9b13e9ede1967707129f2941328ec75487aa5ea205eab0780ef26c33f253204ce08932052a6ed19d13bd62e68b4f795ef17717b9f31e5a76a9f0c16f
-
Filesize
257KB
MD5ae117f47bd80e5dcf72cf81347fceb73
SHA11cd3e4c5fc9fb317b7a8eae6c94d53078800b635
SHA25649b0ec8a4000cb30f15b318bef4b6f59be2d0f7365be4c4b2b4fd5607e16e23c
SHA51272d322ec9b13e9ede1967707129f2941328ec75487aa5ea205eab0780ef26c33f253204ce08932052a6ed19d13bd62e68b4f795ef17717b9f31e5a76a9f0c16f
-
Filesize
257KB
MD5ae117f47bd80e5dcf72cf81347fceb73
SHA11cd3e4c5fc9fb317b7a8eae6c94d53078800b635
SHA25649b0ec8a4000cb30f15b318bef4b6f59be2d0f7365be4c4b2b4fd5607e16e23c
SHA51272d322ec9b13e9ede1967707129f2941328ec75487aa5ea205eab0780ef26c33f253204ce08932052a6ed19d13bd62e68b4f795ef17717b9f31e5a76a9f0c16f
-
Filesize
257KB
MD5ae117f47bd80e5dcf72cf81347fceb73
SHA11cd3e4c5fc9fb317b7a8eae6c94d53078800b635
SHA25649b0ec8a4000cb30f15b318bef4b6f59be2d0f7365be4c4b2b4fd5607e16e23c
SHA51272d322ec9b13e9ede1967707129f2941328ec75487aa5ea205eab0780ef26c33f253204ce08932052a6ed19d13bd62e68b4f795ef17717b9f31e5a76a9f0c16f
-
Filesize
257KB
MD5ae117f47bd80e5dcf72cf81347fceb73
SHA11cd3e4c5fc9fb317b7a8eae6c94d53078800b635
SHA25649b0ec8a4000cb30f15b318bef4b6f59be2d0f7365be4c4b2b4fd5607e16e23c
SHA51272d322ec9b13e9ede1967707129f2941328ec75487aa5ea205eab0780ef26c33f253204ce08932052a6ed19d13bd62e68b4f795ef17717b9f31e5a76a9f0c16f