Analysis

  • max time kernel
    64s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-11-2023 01:54

General

  • Target

    NEAS.21951414d7c026cb46c9f9a6ed7d5a70.exe

  • Size

    37KB

  • MD5

    21951414d7c026cb46c9f9a6ed7d5a70

  • SHA1

    ae06dbd943393f99de5626d56a20dd07919d3366

  • SHA256

    eeac66507183527f587d1b75644eb9ec2cd60a8aa88538ae7f84edf51130f15d

  • SHA512

    07c63e3c02f40ac815c2eeeeb6d79cb0f201f458e180486fd5a4396e6f669ac8070bc1c5004c8bca87163bc301d4a24aeeb8d7b21420e05999656b94efe4fddf

  • SSDEEP

    384:NXDUPQGDDUphUGPvlbblq2aPZHr3eVaRpS496SBsJnI8Bn1gl5:NXDUPVu1vlbpqHZz7pS49+dI8M

Score
10/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.21951414d7c026cb46c9f9a6ed7d5a70.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.21951414d7c026cb46c9f9a6ed7d5a70.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:4460
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 516
      2⤵
      • Program crash
      PID:2340
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4460 -ip 4460
    1⤵
      PID:1660
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:1424
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4232

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

        Filesize

        16KB

        MD5

        db1ecc3bc968ae2ea3fe6ccc3f2454ca

        SHA1

        d8be8544832cf1214e4938d0f71d296d0860105f

        SHA256

        426d186ecb298f3f4bc5a7cc6d164a7446053554a6319007bcfb55343fd4c30b

        SHA512

        03d96ed4cca7a78856cc7224ca84010b34ff993a033cd576509858aa209217dbd1bf7f0e5cd519e64b051fb0cc620e54c53c24289e989bc9c2e62d07b76c8edd

      • memory/4232-43-0x000001718E9E0000-0x000001718E9E1000-memory.dmp

        Filesize

        4KB

      • memory/4232-42-0x000001718E9E0000-0x000001718E9E1000-memory.dmp

        Filesize

        4KB

      • memory/4232-48-0x000001718E9E0000-0x000001718E9E1000-memory.dmp

        Filesize

        4KB

      • memory/4232-9-0x0000017186340000-0x0000017186350000-memory.dmp

        Filesize

        64KB

      • memory/4232-47-0x000001718E9E0000-0x000001718E9E1000-memory.dmp

        Filesize

        4KB

      • memory/4232-53-0x000001718E600000-0x000001718E601000-memory.dmp

        Filesize

        4KB

      • memory/4232-44-0x000001718E9E0000-0x000001718E9E1000-memory.dmp

        Filesize

        4KB

      • memory/4232-41-0x000001718E9C0000-0x000001718E9C1000-memory.dmp

        Filesize

        4KB

      • memory/4232-46-0x000001718E9E0000-0x000001718E9E1000-memory.dmp

        Filesize

        4KB

      • memory/4232-49-0x000001718E9E0000-0x000001718E9E1000-memory.dmp

        Filesize

        4KB

      • memory/4232-50-0x000001718E9E0000-0x000001718E9E1000-memory.dmp

        Filesize

        4KB

      • memory/4232-51-0x000001718E9E0000-0x000001718E9E1000-memory.dmp

        Filesize

        4KB

      • memory/4232-25-0x0000017186440000-0x0000017186450000-memory.dmp

        Filesize

        64KB

      • memory/4232-58-0x000001718E600000-0x000001718E601000-memory.dmp

        Filesize

        4KB

      • memory/4232-45-0x000001718E9E0000-0x000001718E9E1000-memory.dmp

        Filesize

        4KB

      • memory/4232-52-0x000001718E610000-0x000001718E611000-memory.dmp

        Filesize

        4KB

      • memory/4232-55-0x000001718E610000-0x000001718E611000-memory.dmp

        Filesize

        4KB

      • memory/4232-75-0x000001718E750000-0x000001718E751000-memory.dmp

        Filesize

        4KB

      • memory/4232-61-0x000001718E540000-0x000001718E541000-memory.dmp

        Filesize

        4KB

      • memory/4232-73-0x000001718E740000-0x000001718E741000-memory.dmp

        Filesize

        4KB

      • memory/4232-77-0x000001718E860000-0x000001718E861000-memory.dmp

        Filesize

        4KB

      • memory/4232-76-0x000001718E750000-0x000001718E751000-memory.dmp

        Filesize

        4KB

      • memory/4460-5-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/4460-8-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/4460-0-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB