Analysis

  • max time kernel
    121s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    17/11/2023, 18:33

General

  • Target

    NEAS.f3d7f8c4caaf484672e15f23cc390960.exe

  • Size

    41KB

  • MD5

    f3d7f8c4caaf484672e15f23cc390960

  • SHA1

    b94cc768f4a4402921285d29a1caad1db6ebd1b2

  • SHA256

    9a3a9b5b2028e3def5627deee81d9aa2bf5a580bdb7977ef7716135e6df715a1

  • SHA512

    7c59bc56b6bf73770dbc307a23c043347145be50e878c9cb0814acdf58fcd1abc57eb3ac078295429c89f9ba816ba11e4bafb929c642e38af3073ee53a444e35

  • SSDEEP

    768:w9vwJ8rWwK/ItWbhyhkc+3gyZjg44wTaTsN+Po7Yqdv561W9DZydalfuV3lVw2Hc:w2J8r1q2SswdvOW9DOaFufVwWsp

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.f3d7f8c4caaf484672e15f23cc390960.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.f3d7f8c4caaf484672e15f23cc390960.exe"
    1⤵
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2800
    • C:\Windows\system32\cmd.exe
      "cmd.exe" /C WMIC OS get Caption,OSArchitecture,Version /Format:table & WMIC BIOS Get Manufacturer,Name /Format:table & WMIC Baseboard Get Product,Manufacturer /Format:table & WMIC CPU Get Name,NumberOfCores,NumberOfLogicalProcessors /Format:table & WMIC Memorychip Get Manufacturer,Capacity,Speed,PartNumber /Format:table & WMIC Diskdrive Get Model,Size /Format:table & WMIC Path Win32_VideoController get Caption,VideoModeDescription /Format:table & WMIC netuse get Name /Format:table
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3004
      • C:\Windows\System32\Wbem\WMIC.exe
        WMIC OS get Caption,OSArchitecture,Version /Format:table
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2832
      • C:\Windows\System32\Wbem\WMIC.exe
        WMIC BIOS Get Manufacturer,Name /Format:table
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2944
      • C:\Windows\System32\Wbem\WMIC.exe
        WMIC Baseboard Get Product,Manufacturer /Format:table
        3⤵
          PID:2556
        • C:\Windows\System32\Wbem\WMIC.exe
          WMIC CPU Get Name,NumberOfCores,NumberOfLogicalProcessors /Format:table
          3⤵
            PID:2652
          • C:\Windows\System32\Wbem\WMIC.exe
            WMIC Memorychip Get Manufacturer,Capacity,Speed,PartNumber /Format:table
            3⤵
              PID:2552
            • C:\Windows\System32\Wbem\WMIC.exe
              WMIC Diskdrive Get Model,Size /Format:table
              3⤵
                PID:2676
              • C:\Windows\System32\Wbem\WMIC.exe
                WMIC Path Win32_VideoController get Caption,VideoModeDescription /Format:table
                3⤵
                  PID:2684
                • C:\Windows\System32\Wbem\WMIC.exe
                  WMIC netuse get Name /Format:table
                  3⤵
                    PID:2596

              Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                      Filesize

                      344B

                      MD5

                      5b38eef7eb6cbdac98ba6877771cd78b

                      SHA1

                      a6c4f9c14609b395befe6922fcf1da1dc75ef222

                      SHA256

                      6f219960c2b08fda0608d5ece457ab53c9b7d3a91d79c7c76f1ccd6fb7ab07b0

                      SHA512

                      c6fc05db92cf876b7e0b65c5db8f39f7ba643473841b0b739746333a536aa1eec185750a6d085b2573bc72ee640077a095a1664d416dfbe14b1c5dbdfdde4fe1

                    • C:\Users\Admin\AppData\Local\Temp\CabB58B.tmp

                      Filesize

                      61KB

                      MD5

                      f3441b8572aae8801c04f3060b550443

                      SHA1

                      4ef0a35436125d6821831ef36c28ffaf196cda15

                      SHA256

                      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

                      SHA512

                      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

                    • C:\Users\Admin\AppData\Local\Temp\TarB5EC.tmp

                      Filesize

                      163KB

                      MD5

                      9441737383d21192400eca82fda910ec

                      SHA1

                      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

                      SHA256

                      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

                      SHA512

                      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

                    • memory/2800-0-0x0000000000070000-0x0000000000080000-memory.dmp

                      Filesize

                      64KB

                    • memory/2800-1-0x000007FEF5C30000-0x000007FEF661C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/2800-3-0x000000001ABA0000-0x000000001AC20000-memory.dmp

                      Filesize

                      512KB

                    • memory/2800-75-0x000007FEF5C30000-0x000007FEF661C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/2800-76-0x000000001ABA0000-0x000000001AC20000-memory.dmp

                      Filesize

                      512KB