Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2024 02:59

General

  • Target

    55e47629a6d2667bc3be22c2d4384480_NEAS.exe

  • Size

    146KB

  • MD5

    55e47629a6d2667bc3be22c2d4384480

  • SHA1

    b0f0c50cc39cf681c5edcf8072109d73fcc4211b

  • SHA256

    63d2589a6f40b01c512b72da1348ccb501740a27a8ec3be4edef6765db8bb679

  • SHA512

    387087a8a088c8754916621d48f03203c75d88b3e5ddfcaf846740d2bd8c85bb3215110370d6bc7c0f70167c3f0d12d1a3b329c613406b107168b1766fd13deb

  • SSDEEP

    3072:+nymCAIuZAIuYSMjoqtMHfhflixisXxXk:JmCAIuZAIuDMVtM/ih0

Score
9/10

Malware Config

Signatures

  • Renames multiple (3389) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55e47629a6d2667bc3be22c2d4384480_NEAS.exe
    "C:\Users\Admin\AppData\Local\Temp\55e47629a6d2667bc3be22c2d4384480_NEAS.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2364

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini.tmp

    Filesize

    147KB

    MD5

    cf622a73ebb1e1ae0cd1c655ca554677

    SHA1

    42367309dff120952827fe3f0b373ef4f20bfc12

    SHA256

    a990e0800dd2f373096007fa3ba9e5a35d05c6cfa7e27da95b6ce6f8394a7e87

    SHA512

    0c36caecb8b0e25b92d6827c7c05046d9b23cc75e264fd7b1f24f9de4c1612f464fb8546210fa5aac0597e0b98c57e1d58da7666a8e89172f1e51e0012e6316f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    155KB

    MD5

    02d53f38ab1aebe026cbb1edc3877ae4

    SHA1

    e15d55578ffdbe4af7d11485830e093f6e0c4da3

    SHA256

    4632e8c0f97d565e673be4144da27b0bd38021bfbac2bd3d9c36e6157e6fd838

    SHA512

    4d65b0f233d62dfcb9ec0f9922206b03c45788ea9f2aa8b69e1e7b53ac9694d7b1cdeea7fcee753566494288d36ae5b96bd1797bdf390aecd4fc7ead9ec7580f

  • memory/2364-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2364-438-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB