Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2024, 00:08

General

  • Target

    38564b8f0d27bf9fc9f58923b9e9e270_NEAS.exe

  • Size

    116KB

  • MD5

    38564b8f0d27bf9fc9f58923b9e9e270

  • SHA1

    0b23affb30695a77ea6466d663eae3013e93dc6a

  • SHA256

    dc57b70472a60ec7947b25cb73025ca43368f21ba8f94c691a601943477c7847

  • SHA512

    0fc397ac3918aef63528b67ef1651731da92c78acee90c33f89c34cb827b06088e02690ba39d6b8c0225d2ca032c24c2c6bbca17329352b0d8b2f5cb055b6137

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfli4:hfAIuZAIuYSMjoqtMHfhflixim0SyJ

Score
9/10

Malware Config

Signatures

  • Renames multiple (4864) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38564b8f0d27bf9fc9f58923b9e9e270_NEAS.exe
    "C:\Users\Admin\AppData\Local\Temp\38564b8f0d27bf9fc9f58923b9e9e270_NEAS.exe"
    1⤵
    • Drops file in Program Files directory
    PID:512

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-540404634-651139247-2967210625-1000\desktop.ini.tmp

    Filesize

    116KB

    MD5

    d7b5aa69a95b7489ab6da20dbeac8f6d

    SHA1

    6053ded109eee464dab5c72dd7953a8b5c51dc82

    SHA256

    c29c08f19d426c16cd960d706e84ec5ae7f2eb33d37beffa82f0fca747bbf332

    SHA512

    43828288a57c1de36778097310515465d2bd5f538bdf6658d523c2617e6baf3df4e87661e607a67d6863fc30890988274bf158655ee0bff5db1d116735fcfa8c

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    215KB

    MD5

    57dfe0e97a83e51e905f0ad34ded9914

    SHA1

    10dd9e8ece44c7f8a0f45aea3683be0c51aef6ca

    SHA256

    8be5d4ff1e168a4c367e3a11a2b20cac9bd3084093def086e3a42010f56a22ad

    SHA512

    3832028126e4c2600b6f17d4cf8de822f1ff515989a564b677c816ff0d1ad25e5dd0142ccc91cedeea61466060b9396d92fe85dcc3c5cb18fe63e34a49e67836

  • memory/512-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/512-1006-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB