Analysis
-
max time kernel
136s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 08:31
Behavioral task
behavioral1
Sample
0bab78d1c15f695d24664e1d3565eb80_NEAS.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0bab78d1c15f695d24664e1d3565eb80_NEAS.exe
Resource
win10v2004-20240426-en
General
-
Target
0bab78d1c15f695d24664e1d3565eb80_NEAS.exe
-
Size
475KB
-
MD5
0bab78d1c15f695d24664e1d3565eb80
-
SHA1
8dfa17164f4139d11e8d07199c0c31f21db3de9a
-
SHA256
b372ea9bd14f14e2974963ad0a1b89d507fdce5654b937adf0fd0367821922b3
-
SHA512
f2c55b80db518d121453bce5fa031e62ceeed958f60ce701fc74fbb006d188055f79948a23ba510b2acafd335e053f6a6fd261b57fe45cad88c2105a23396544
-
SSDEEP
6144:ZNP9wLvhTH9VWT6MGYqgmHOTUVAxsBlMzFYU9zeI00Rh2cQbEG/:X9qRH7MGYqgmuTGhlMzFYUlf00o
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4932-0-0x0000000000400000-0x0000000000472000-memory.dmp upx behavioral2/files/0x0007000000023403-6.dat upx behavioral2/memory/4932-103-0x0000000000400000-0x0000000000472000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\driv64.exe 0bab78d1c15f695d24664e1d3565eb80_NEAS.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
475KB
MD50bab78d1c15f695d24664e1d3565eb80
SHA18dfa17164f4139d11e8d07199c0c31f21db3de9a
SHA256b372ea9bd14f14e2974963ad0a1b89d507fdce5654b937adf0fd0367821922b3
SHA512f2c55b80db518d121453bce5fa031e62ceeed958f60ce701fc74fbb006d188055f79948a23ba510b2acafd335e053f6a6fd261b57fe45cad88c2105a23396544