Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
14/11/2023, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.7859667b067ad832fb5bd22a1c336b77.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.7859667b067ad832fb5bd22a1c336b77.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.7859667b067ad832fb5bd22a1c336b77.exe
-
Size
201KB
-
MD5
7859667b067ad832fb5bd22a1c336b77
-
SHA1
d7eb923bfd63b9d9c32600663027933cc060ac68
-
SHA256
4118840a4ab28936fdebf2a9db903bde65ab0ca9904ace6eb50357c9b7372fe4
-
SHA512
118c07e9b434c5ce1869de4b8892e67e46a70bb041c18e226e38efd9569a33e712550d79df334528df61bed42e0d924ffa9afcdb4fba0a0c761b99aba5b14f5d
-
SSDEEP
3072:Trewx2yGwF7Zet/AlbY/9TdtV7OAO571dcr29JZszS:157ZZlbHlpkS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2704 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Windows\CurrentVersion\Run\stubpath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\apple.exe" NEAS.7859667b067ad832fb5bd22a1c336b77.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2704 1696 NEAS.7859667b067ad832fb5bd22a1c336b77.exe 29 PID 1696 wrote to memory of 2704 1696 NEAS.7859667b067ad832fb5bd22a1c336b77.exe 29 PID 1696 wrote to memory of 2704 1696 NEAS.7859667b067ad832fb5bd22a1c336b77.exe 29 PID 1696 wrote to memory of 2704 1696 NEAS.7859667b067ad832fb5bd22a1c336b77.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.7859667b067ad832fb5bd22a1c336b77.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.7859667b067ad832fb5bd22a1c336b77.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\1.bat2⤵
- Deletes itself
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
191B
MD5ccade41c71ff50cc7355a6aa8c321431
SHA18c2da5359ea745cfae1351c19a2552e79e005acc
SHA2567bdf9876984f6ccb4a02252fb78210e7dc10520cd812ac7d0e2cac997806b09d
SHA512eecb56c0940aac7743200612229db77d528248b83f86f4418c6b727c25229b242d12f1201ed8ca947c2d8828e193c586da2640553e0bbae292697e0e8bb23fc4
-
Filesize
191B
MD5ccade41c71ff50cc7355a6aa8c321431
SHA18c2da5359ea745cfae1351c19a2552e79e005acc
SHA2567bdf9876984f6ccb4a02252fb78210e7dc10520cd812ac7d0e2cac997806b09d
SHA512eecb56c0940aac7743200612229db77d528248b83f86f4418c6b727c25229b242d12f1201ed8ca947c2d8828e193c586da2640553e0bbae292697e0e8bb23fc4