Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
17-11-2023 05:13
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0edea2038d8afe82ce544bb21ea35380.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.0edea2038d8afe82ce544bb21ea35380.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.0edea2038d8afe82ce544bb21ea35380.exe
-
Size
1.9MB
-
MD5
0edea2038d8afe82ce544bb21ea35380
-
SHA1
c1bf7a8684af3c51c5bc6e5c976f45d43f8e3962
-
SHA256
2ce2a888e854909a6a00196d5d05f44c11028608f7fbd2a9ef4ca47c8e79ab99
-
SHA512
5edc6edda183e4b2d6afa97927f8c14f72220faabe92afb0ebc09b80e5a62f19c96b92973391d4e811c29cf47508be776ea5f5cbeda1c268487c7c4087d7ad52
-
SSDEEP
49152:Qoa1taC070dKL3WI6PP0lx9/+bR1LtKKmLuVbgls:Qoa1taC0j3X6H0V/aR1LtKFLu5gls
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2540 3F42.tmp -
Executes dropped EXE 1 IoCs
pid Process 2540 3F42.tmp -
Loads dropped DLL 1 IoCs
pid Process 2200 NEAS.0edea2038d8afe82ce544bb21ea35380.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2540 2200 NEAS.0edea2038d8afe82ce544bb21ea35380.exe 28 PID 2200 wrote to memory of 2540 2200 NEAS.0edea2038d8afe82ce544bb21ea35380.exe 28 PID 2200 wrote to memory of 2540 2200 NEAS.0edea2038d8afe82ce544bb21ea35380.exe 28 PID 2200 wrote to memory of 2540 2200 NEAS.0edea2038d8afe82ce544bb21ea35380.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.0edea2038d8afe82ce544bb21ea35380.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.0edea2038d8afe82ce544bb21ea35380.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\3F42.tmp"C:\Users\Admin\AppData\Local\Temp\3F42.tmp" --splashC:\Users\Admin\AppData\Local\Temp\NEAS.0edea2038d8afe82ce544bb21ea35380.exe 3B69A0EF66B4541ECB33D24917432550D05A869E46D5DC1F4EB5757C6F786964126CAA2BEFA8BC2623E147B1C04E3FC5E752A917BDF833BA28F4E24F68C556DF2⤵
- Deletes itself
- Executes dropped EXE
PID:2540
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5c8da196aed7951ea2b47ea1e9f53b1aa
SHA1be058bf2cdcefd1426e51f51d00f44362bf4b511
SHA25642cb00afbbbb968f47e78029df80fd304f26e3109496c3fbbe6a68986ae8ff37
SHA512a17c616dbca6c5c7016efbe7b1563a3c0946dd74fb6e0fccf28d392258a308e38ce87b7447e7459398da5b09757bcc27ee48fa39e928fa045671068ee1de0dbc
-
Filesize
1.9MB
MD5c8da196aed7951ea2b47ea1e9f53b1aa
SHA1be058bf2cdcefd1426e51f51d00f44362bf4b511
SHA25642cb00afbbbb968f47e78029df80fd304f26e3109496c3fbbe6a68986ae8ff37
SHA512a17c616dbca6c5c7016efbe7b1563a3c0946dd74fb6e0fccf28d392258a308e38ce87b7447e7459398da5b09757bcc27ee48fa39e928fa045671068ee1de0dbc