Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 05:29

General

  • Target

    72b98a2776d8133405f5a395f2cc97f0_NEAS.exe

  • Size

    153KB

  • MD5

    72b98a2776d8133405f5a395f2cc97f0

  • SHA1

    c17960ac7f18f1721ed4ff6ade5396b16163b4e4

  • SHA256

    f15ccc94c61b18fe8c137128d62a85262fa33a840c8d3c055a3de3e5983f50ff

  • SHA512

    b6b9c63adafb6fa45973920c14187407b89b918997fe21918a868b40ce7e98fb8b47a45935060595b52e177059c79a1e5d02947b8659e585d6d1bcf2c2058257

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q1pkMJ+ZGtK1+ZGtKQNMdTajOtGtU1wAIuZAIuJC:KQSo1EZGtKgZGtK/PgtU1wAIuZAIuY

Score
9/10

Malware Config

Signatures

  • Renames multiple (3446) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72b98a2776d8133405f5a395f2cc97f0_NEAS.exe
    "C:\Users\Admin\AppData\Local\Temp\72b98a2776d8133405f5a395f2cc97f0_NEAS.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2924

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp

          Filesize

          153KB

          MD5

          dd0d4df88c6197749f30db99def56405

          SHA1

          7b1645927867a78a0134e6fec71c8201e4d75664

          SHA256

          ba6b1a31e30ca9fdd7389b0134c1ab95ae561f2b7d0f132dac957fb241e7527b

          SHA512

          de55730ebfd0a188be7f4ac30f60491e74054db14881a0d920d6d75b8d6c77202974cf07e927ce1b9f560ef64022e0f303797914d522505d2c58d23502bcbb16

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          162KB

          MD5

          7c74025c65ef3fd69db06bbff56ed2d9

          SHA1

          ff52a461e3f7665c3498178dedab917fac401008

          SHA256

          43d4712fe95a502769cbf1fb3f9791a642a592768559b5ba2fe03c228a4fcd1d

          SHA512

          701cb4ea19e3ac198e7b17c43711a185503bc00c883090255861516b4a02d8ba162499d5802b0794d84b080818458c5ee5f614b2565c6439f148741b586620d1

        • memory/2924-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2924-86-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB