Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
15/11/2023, 06:07
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.440d663d8a714e0c39bd251b1aaede90.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.440d663d8a714e0c39bd251b1aaede90.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.440d663d8a714e0c39bd251b1aaede90.exe
-
Size
2.4MB
-
MD5
440d663d8a714e0c39bd251b1aaede90
-
SHA1
c4276c8c3a348f4030092018dbe49056c2d6b670
-
SHA256
a92c7af15b989b1077029d40dd299c8ab0c0547490c6d3143bcf7d02c3c269fc
-
SHA512
e5faefcf67a185f248a234ac543c175b2cb5dbdb74fa7f0d4be94bb674e6c108a23afa7eae752d6aa0b2122a9fab5c21b4f4af26af5e4b10b2b37823a7643075
-
SSDEEP
49152:rIROZIEG190vgWgigZ6W5LXP63KNUR9IETjALJr87gigHR8z:k8ZREWYJXy3Z
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1684 NEAS.440d663d8a714e0c39bd251b1aaede90.exe -
Executes dropped EXE 1 IoCs
pid Process 1684 NEAS.440d663d8a714e0c39bd251b1aaede90.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 14 IoCs
pid pid_target Process procid_target 1372 1300 WerFault.exe 85 776 1684 WerFault.exe 95 5080 1684 WerFault.exe 95 680 1684 WerFault.exe 95 760 1684 WerFault.exe 95 4908 1684 WerFault.exe 95 264 1684 WerFault.exe 95 4200 1684 WerFault.exe 95 3328 1684 WerFault.exe 95 3964 1684 WerFault.exe 95 3952 1684 WerFault.exe 95 3428 1684 WerFault.exe 95 680 1684 WerFault.exe 95 2688 1684 WerFault.exe 95 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1684 NEAS.440d663d8a714e0c39bd251b1aaede90.exe 1684 NEAS.440d663d8a714e0c39bd251b1aaede90.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1300 NEAS.440d663d8a714e0c39bd251b1aaede90.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1684 NEAS.440d663d8a714e0c39bd251b1aaede90.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1300 wrote to memory of 1684 1300 NEAS.440d663d8a714e0c39bd251b1aaede90.exe 95 PID 1300 wrote to memory of 1684 1300 NEAS.440d663d8a714e0c39bd251b1aaede90.exe 95 PID 1300 wrote to memory of 1684 1300 NEAS.440d663d8a714e0c39bd251b1aaede90.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.440d663d8a714e0c39bd251b1aaede90.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.440d663d8a714e0c39bd251b1aaede90.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1300 -s 3442⤵
- Program crash
PID:1372
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.440d663d8a714e0c39bd251b1aaede90.exeC:\Users\Admin\AppData\Local\Temp\NEAS.440d663d8a714e0c39bd251b1aaede90.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 3443⤵
- Program crash
PID:776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 3723⤵
- Program crash
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 6483⤵
- Program crash
PID:680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 6683⤵
- Program crash
PID:760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 7203⤵
- Program crash
PID:4908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 9043⤵
- Program crash
PID:264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 14203⤵
- Program crash
PID:4200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 14323⤵
- Program crash
PID:3328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 16883⤵
- Program crash
PID:3964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 14803⤵
- Program crash
PID:3952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 15323⤵
- Program crash
PID:3428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 15483⤵
- Program crash
PID:680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 6323⤵
- Program crash
PID:2688
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1300 -ip 13001⤵PID:2396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1684 -ip 16841⤵PID:3816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1684 -ip 16841⤵PID:4100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1684 -ip 16841⤵PID:3032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1684 -ip 16841⤵PID:1076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1684 -ip 16841⤵PID:1840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1684 -ip 16841⤵PID:1520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1684 -ip 16841⤵PID:4256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1684 -ip 16841⤵PID:4328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1684 -ip 16841⤵PID:3832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1684 -ip 16841⤵PID:2812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1684 -ip 16841⤵PID:2620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1684 -ip 16841⤵PID:3080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1684 -ip 16841⤵PID:4216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5fa82403eebbc7e3af96b571a91edf66e
SHA1730eb13025152cd617c45ff96467d0513549487e
SHA25609ea06c5feb6f8a00f411ec6c898cea45c787c9a0b67be4af7543e85e9dfb9cc
SHA512bf8e0d9ae3647fda925929854c8f2a2693f046a5ef3b71c15be814fd8aa11f4bdeb2c0dd432f73d54a271959ee2690ab72dbb32fb9979a8dd860f9e43cd5c3bb