Analysis

  • max time kernel
    106s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/11/2023, 09:49

General

  • Target

    NEAS.01a442772726bef4566a19e37ebffa67.exe

  • Size

    584KB

  • MD5

    01a442772726bef4566a19e37ebffa67

  • SHA1

    04a57bc521dc70f13e4eeb6dc9cfa5d6804f50da

  • SHA256

    61e8a6986054ecb15e8bd50024f287d7b6de48bf1d441e498c4cb6ae84510e73

  • SHA512

    c3b380f4b28274967f83c3de86559c68985fc17627432f6732bbeff886133c66e8cc82c8cf60dabca548c990b24190929cb9588502680e3498a4bb2d84ed67b8

  • SSDEEP

    12288:0eK/0cw2eEBIeHab2nyee8eqqqSNY+AVQ9Z3qZeqJtZegee9aE:k/Rw2vyeaee8ejqyUaqZeqJtZegee9T

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Modifies registry class 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.01a442772726bef4566a19e37ebffa67.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.01a442772726bef4566a19e37ebffa67.exe"
    1⤵
    • Drops file in Drivers directory
    • Sets service image path in registry
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Modifies registry class
    PID:2736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\drivers\spools.exe

    Filesize

    595KB

    MD5

    582a9228b6b192647b0e2b3fe56a6461

    SHA1

    85c355091a42eaa3c2cf836a7be05f0e82ffbe86

    SHA256

    0937382dd777a360efd4728d81664a44248a3e1f630411266f68444fd1444f3c

    SHA512

    bce2a77f0caa9ee9b379f406c082899a9944a438f81ffa35d2ef70a4520c6dd2d7eb7959f8a19af903c2bd7a1f4974d731218b2895d8c92ffa52739d838ff011

  • memory/2736-0-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2736-9-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB