Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    17-11-2023 05:13

General

  • Target

    NEAS.0edea2038d8afe82ce544bb21ea35380.exe

  • Size

    1.9MB

  • MD5

    0edea2038d8afe82ce544bb21ea35380

  • SHA1

    c1bf7a8684af3c51c5bc6e5c976f45d43f8e3962

  • SHA256

    2ce2a888e854909a6a00196d5d05f44c11028608f7fbd2a9ef4ca47c8e79ab99

  • SHA512

    5edc6edda183e4b2d6afa97927f8c14f72220faabe92afb0ebc09b80e5a62f19c96b92973391d4e811c29cf47508be776ea5f5cbeda1c268487c7c4087d7ad52

  • SSDEEP

    49152:Qoa1taC070dKL3WI6PP0lx9/+bR1LtKKmLuVbgls:Qoa1taC0j3X6H0V/aR1LtKFLu5gls

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.0edea2038d8afe82ce544bb21ea35380.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.0edea2038d8afe82ce544bb21ea35380.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Users\Admin\AppData\Local\Temp\3F42.tmp
      "C:\Users\Admin\AppData\Local\Temp\3F42.tmp" --splashC:\Users\Admin\AppData\Local\Temp\NEAS.0edea2038d8afe82ce544bb21ea35380.exe 3B69A0EF66B4541ECB33D24917432550D05A869E46D5DC1F4EB5757C6F786964126CAA2BEFA8BC2623E147B1C04E3FC5E752A917BDF833BA28F4E24F68C556DF
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2540

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3F42.tmp

    Filesize

    1.9MB

    MD5

    c8da196aed7951ea2b47ea1e9f53b1aa

    SHA1

    be058bf2cdcefd1426e51f51d00f44362bf4b511

    SHA256

    42cb00afbbbb968f47e78029df80fd304f26e3109496c3fbbe6a68986ae8ff37

    SHA512

    a17c616dbca6c5c7016efbe7b1563a3c0946dd74fb6e0fccf28d392258a308e38ce87b7447e7459398da5b09757bcc27ee48fa39e928fa045671068ee1de0dbc

  • \Users\Admin\AppData\Local\Temp\3F42.tmp

    Filesize

    1.9MB

    MD5

    c8da196aed7951ea2b47ea1e9f53b1aa

    SHA1

    be058bf2cdcefd1426e51f51d00f44362bf4b511

    SHA256

    42cb00afbbbb968f47e78029df80fd304f26e3109496c3fbbe6a68986ae8ff37

    SHA512

    a17c616dbca6c5c7016efbe7b1563a3c0946dd74fb6e0fccf28d392258a308e38ce87b7447e7459398da5b09757bcc27ee48fa39e928fa045671068ee1de0dbc

  • memory/2200-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2540-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB