Analysis

  • max time kernel
    155s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-11-2023 22:04

General

  • Target

    NEAS.6a74768de5035c243e3ddb22769eb410.exe

  • Size

    1.1MB

  • MD5

    6a74768de5035c243e3ddb22769eb410

  • SHA1

    a5bbda1281b578821266be63cc75cc6d410443fd

  • SHA256

    5107d5b9da6e5e27baec355c7057bd8e8e75203d65cab78e0912ae123d3ece62

  • SHA512

    b3246ac93819c36e82f35449d4d75a967c22806423e9d9ba1248da80bb64de8295f5aa803b1d025a9c9d7d6c45b5af33c466ca9a5876b98672b5724b8d3e5bf8

  • SSDEEP

    24576:65jcAkSYqyEZYTqMi8CtBd2QHCHmTBW5mT3:gpYqQqJtb2Iz

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.6a74768de5035c243e3ddb22769eb410.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.6a74768de5035c243e3ddb22769eb410.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:1252

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\odt\office2016setup.exe-

    Filesize

    6.2MB

    MD5

    adc35bf1d9085fb39962a4f2d53e9b1d

    SHA1

    c9473e3751dc822c3af6006714f4645bf6f5b803

    SHA256

    3bc177ef7c389c5403eb9ac8180d14db69f28812eb25cea3fc60fce32dd21876

    SHA512

    61b3ae19a320fcccbaa08f6d70958b5d293572da3434564b110988c106ed61f731806597b1f03d3b198850967f5771e11b6883239e83eb94ccb1e2bdf24a1905

  • memory/1252-1639-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1252-610-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1252-1246-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1252-1359-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1252-1593-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1252-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1252-1900-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1252-2696-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1252-3914-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1252-4290-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1252-4291-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1252-4292-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1252-4293-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1252-4295-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB