Analysis

  • max time kernel
    142s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    16-11-2023 21:13

General

  • Target

    NEAS.10b81265235cb48dbabf45d482c52630.exe

  • Size

    8.0MB

  • MD5

    10b81265235cb48dbabf45d482c52630

  • SHA1

    fd406b2bff9ac4abd36e1ba6ee366cf4575ee068

  • SHA256

    999b9b70d5078d72d6b018824ad58e53dd6703c1bd9fa9bc0a6ec46724450161

  • SHA512

    1d004444819bef2584d16c3bd1841cf4c86085c7e4649932cd5b4087f13725c7e9dd432fbc1b1419b2ece0515254a742b55957cf6c549f170002ec16531dcb69

  • SSDEEP

    196608:NoMl8D1jXgPo2S9+ULdNPtbuPZOOmnqogHh/p3k:kmw2SlLdNPt6ROOmqZn3k

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 19 IoCs
  • Program crash 1 IoCs
  • NTFS ADS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.10b81265235cb48dbabf45d482c52630.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.10b81265235cb48dbabf45d482c52630.exe"
    1⤵
    • Drops file in Drivers directory
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1920
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 7588
      2⤵
      • Program crash
      PID:3644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\inf4D2.tmp

    Filesize

    9.0MB

    MD5

    6eff66788320ad752dfda2b30aef041c

    SHA1

    308f9aed69e7786c4553a983e7e8d0874a38e92d

    SHA256

    a1d560d99241dd7e148207bb08fcef6111e9fb120d25987020aa2ca0aa6c6514

    SHA512

    69e4cee488214389bc428305f87397ecfffcc17a0a4159e71dd0783295bb3871849a1bfbf695e526319bac8796d5d42e2fb4dc40c30887c22ad80bb6f9dd967c

  • memory/1920-154-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1920-671-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1920-900-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1920-1002-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1920-1051-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1920-1082-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1920-1183-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1920-1248-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB