Analysis
-
max time kernel
137s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2023 04:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.d53c1af137629d34206c580be5a6aab0.exe
Resource
win7-20231023-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.d53c1af137629d34206c580be5a6aab0.exe
Resource
win10v2004-20231023-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
NEAS.d53c1af137629d34206c580be5a6aab0.exe
-
Size
384KB
-
MD5
d53c1af137629d34206c580be5a6aab0
-
SHA1
a36b957525b6259cd05a6ad0c126fe2eea218784
-
SHA256
422514b1f9a0237939b3957c9f8a273a4c6198cd6d597832ec4095f115eccb30
-
SHA512
61ca9951411586f12b7068c0199d6419aae55969f18db20313bc25df1bdc299f1d8b81092b072bca4a4b10b6bf9ca69f0dc168de003964a88c8631b6888a2e18
-
SSDEEP
6144:6UORK1ttbV3kSobTYZGiNdniFoh+uiclxjGSv05FuPuBDeU2W6fa:6ytbV3kSoXaLncosJCnv0OmBB2y
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4936 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4992 NEAS.d53c1af137629d34206c580be5a6aab0.exe 4992 NEAS.d53c1af137629d34206c580be5a6aab0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4992 NEAS.d53c1af137629d34206c580be5a6aab0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4992 wrote to memory of 2904 4992 NEAS.d53c1af137629d34206c580be5a6aab0.exe 85 PID 4992 wrote to memory of 2904 4992 NEAS.d53c1af137629d34206c580be5a6aab0.exe 85 PID 2904 wrote to memory of 4936 2904 cmd.exe 87 PID 2904 wrote to memory of 4936 2904 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d53c1af137629d34206c580be5a6aab0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d53c1af137629d34206c580be5a6aab0.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\NEAS.d53c1af137629d34206c580be5a6aab0.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:4936
-
-