Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    16/11/2023, 08:01

General

  • Target

    NEAS.9d18bf277af1ea188dd71053ea3bbe00.exe

  • Size

    483KB

  • MD5

    9d18bf277af1ea188dd71053ea3bbe00

  • SHA1

    31d1ad7a2d6d99b4f00e377cc812ed220ba8f87c

  • SHA256

    773772592026c1d1e6e91aaaa497f8bfa8392c0074f79b076a14ca4a1663f878

  • SHA512

    1529118d4261026de4bff4fa2d2a38fc3de9e99a47c1db89a503f1cf3a9ab0a94e34383fab71c76d2326c9a5b87573b54232ff43aa5da975a2e11c90e712f450

  • SSDEEP

    12288:01bwfEpGead64sjmWO5VSfk76y4M3vZZD4Q3RF+pz:01bwfe4syWESfk76rAvZZf3RF+pz

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.9d18bf277af1ea188dd71053ea3bbe00.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.9d18bf277af1ea188dd71053ea3bbe00.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:1196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCXB138.tmp

    Filesize

    62KB

    MD5

    c28efdd834ed453de90e550a8052f4b6

    SHA1

    1b4bd9e6b5254afdffa1d67e4f7f41fd320baee3

    SHA256

    ef1d62466f858e8f95d22c09679542c14ed2e711b64c7c75f5dd9edbd6da0ce3

    SHA512

    650ddc81119bf722a1af9ad01b5b76997b7cdcd075ea1a34f60ddc14902f1d0238eb8c272e83cefa2ee9f840097daedbe230049a1e7a7c1427ab9fcab30c1d47

  • C:\Windows\SysWOW64\xdccPrograms\7zG.exe

    Filesize

    567KB

    MD5

    593fe70ca4a326593f236e0940d7c6b9

    SHA1

    098ab2845bb409d4ede837abef4ce8a210a4ea89

    SHA256

    308aad4b2e0fccfadd3e38b07fa54c4aaa63bea4185e0217fd6c914faf8ed9bd

    SHA512

    02b2e38f342244e152d6f909777773ae9317e5856ec22845ae5d0dad24b790a142d90ca3b7ae3be7456af0cb3d75df50f975585769b956526fa3021a1c65eb52

  • memory/1196-124-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1196-125-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1196-120-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1196-121-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1196-122-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1196-123-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1196-30-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1196-35-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1196-126-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1196-127-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1196-128-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1196-129-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1196-130-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1196-131-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB