Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 00:14

General

  • Target

    398284249df99bd668158b2a94485bc0_NEAS.exe

  • Size

    130KB

  • MD5

    398284249df99bd668158b2a94485bc0

  • SHA1

    33576f876256c753b52ed8cf1aae14d912a17c47

  • SHA256

    b92cadc892f3841608fcb6d922c4c6bc380d8ba9672ab75275b2de42a1a3c769

  • SHA512

    923102d8cdb5c6b4576566f45ea286eddb21cb84c8965f7439126044cdbd93ce3999fdeec3241d2d95bff7451949c75589acd851928b269a487956f0750e955b

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSC1:+nymCAIuZAIuYSMjoqtMHfhf5St

Score
9/10

Malware Config

Signatures

  • Renames multiple (3450) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\398284249df99bd668158b2a94485bc0_NEAS.exe
    "C:\Users\Admin\AppData\Local\Temp\398284249df99bd668158b2a94485bc0_NEAS.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1276

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2248906074-2862704502-246302768-1000\desktop.ini.tmp

          Filesize

          131KB

          MD5

          065efba2a36d2a099d2dd820151b6851

          SHA1

          5627126e17b5d0f2df8127332165602114805ca0

          SHA256

          c5fcecbc592249606042fc7fa599236150eac9712626e4e802c8b86c7f704436

          SHA512

          fa88d8d3a7edcd86d4308d436224170da23874f40e6a6678e6f0bd327dc427f5e4668b7863592404e8c6a7ed3af2dc3ba81f07bc9c5762468c5205a3c917bc9a

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          140KB

          MD5

          bd747a5afe7099274fe2c76ecaff5f85

          SHA1

          7465b6a293d6b297d24679257760630da0d13550

          SHA256

          364daea35589031f5ec94d7ece9a1839a566b1124737eb3b2938fa4870d9db4e

          SHA512

          38beee60441725355b8e9517c2a9349e0d598a1370d12dbaf21cd438d9832c04093971157897dd8e33654993f4c7a24f2c78fe2190c5158bab97359a1baa7869

        • memory/1276-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1276-584-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB