Analysis

  • max time kernel
    134s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2024, 07:21

General

  • Target

    8f8122f5288bd45291a93922a079e0e0_NEAS.exe

  • Size

    225KB

  • MD5

    8f8122f5288bd45291a93922a079e0e0

  • SHA1

    53460f94b4c0608a0b2aef119785605ec4dc8d1c

  • SHA256

    b990e7f5247dc5b00282bb866c170787c104bd69012551bff180149d6fa01428

  • SHA512

    e01a54ac249ca8a4fb5993e87b1d9c9216e61d9b84348a63dc224ec47078ba11d6aa98a87cce2427a3e57b97cb8661e90e17da9181746c6d1c618d667a798835

  • SSDEEP

    3072:Xjr87S7Gnz55Eocq0g1eUfMJceuUiv20VCGomDv3V/7f1M8kmvmMCEz5:sZl2lqJxMJ3up+eCGDNDtR5CEz5

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f8122f5288bd45291a93922a079e0e0_NEAS.exe
    "C:\Users\Admin\AppData\Local\Temp\8f8122f5288bd45291a93922a079e0e0_NEAS.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Users\Admin\AppData\Local\Temp\dYy4sSlEZg9JIit.exe
      C:\Users\Admin\AppData\Local\Temp\dYy4sSlEZg9JIit.exe
      2⤵
      • Executes dropped EXE
      PID:4284
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    404KB

    MD5

    71b35d815353c0187104f380098e23ab

    SHA1

    befdd3298f3e4038f37be0f4878174ce818b812b

    SHA256

    82cacf211b4d076a47a70dd3c67ff1c54dfa5c40e0c858d0489382811d60f26a

    SHA512

    6044c70e80bec072b62db04edac0a37c71cdea237d10ed018014bd4083f0f003ad1d86f731883d189286131d5b9e08de9161ec03d78c8992ef7bcae2b8329a84

  • C:\Users\Admin\AppData\Local\Temp\dYy4sSlEZg9JIit.exe

    Filesize

    143KB

    MD5

    b27ea830fb39bc056e65f9a2260ae216

    SHA1

    b69e40ee5cabe0721d2d1e9fbdd4088fd87592d6

    SHA256

    fb7fab836f744d669451dcd38aa7d2a9c74c6af893c258d079439b58abce70d8

    SHA512

    22cad79d90a949174828ee5e3ce621113591c7c991c55c1a6a44a4555002adeb3bcbd9bab6cfbbfdefd663b76ac2dae96d70a01c527b312c7e8d223334a30219

  • C:\Windows\CTS.exe

    Filesize

    82KB

    MD5

    546ffd2b72777e6a9e350780b79f99d4

    SHA1

    a620be74a2f432656e38e51cd02fbdc3e3b312c2

    SHA256

    c651b378896fad56ddeb1fec2c578a822bbb13269ec881f9420bbf47c9fbfbb5

    SHA512

    57d49f830f9774ef0a4b6d026211360ea4ebcc6b236b72107401284559c7c589733bccc8af10c5a0cee5b97880d24a4e9954beb81887b1b124f8a42cca456fac

  • memory/1240-0-0x0000000000AB0000-0x0000000000AC9000-memory.dmp

    Filesize

    100KB

  • memory/1240-8-0x0000000000AB0000-0x0000000000AC9000-memory.dmp

    Filesize

    100KB

  • memory/1732-7-0x00000000004B0000-0x00000000004C9000-memory.dmp

    Filesize

    100KB

  • memory/1732-37-0x00000000004B0000-0x00000000004C9000-memory.dmp

    Filesize

    100KB

  • memory/4284-15-0x00007FFE2A423000-0x00007FFE2A425000-memory.dmp

    Filesize

    8KB

  • memory/4284-19-0x0000000000980000-0x00000000009A8000-memory.dmp

    Filesize

    160KB

  • memory/4284-26-0x00007FFE2A420000-0x00007FFE2AEE1000-memory.dmp

    Filesize

    10.8MB

  • memory/4284-38-0x00007FFE2A420000-0x00007FFE2AEE1000-memory.dmp

    Filesize

    10.8MB