Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 09:00

General

  • Target

    183bdf48a8a9d53bfc8b311739377670_NEAS.exe

  • Size

    591KB

  • MD5

    183bdf48a8a9d53bfc8b311739377670

  • SHA1

    62c40790873bf0833613136eb54949b5c0d62458

  • SHA256

    6f11a9a21940da807d5680298539503bf1829ec96dda1355ffb719b2f631bcde

  • SHA512

    e2212c3d27cf2704678db65923c13e81501bbcafe83388ba67f57eb124551aa82709ca9b9565cc4842aefa184aff58fd11255d506e8085e89233a7d551821fdc

  • SSDEEP

    12288:VGbZFT9o+WkcS9SQcCyfi0npM4dl0v5Jdm5IpXt1Up0:UT97jD9QCyfiEM4dmv5BJtOp0

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\183bdf48a8a9d53bfc8b311739377670_NEAS.exe
    "C:\Users\Admin\AppData\Local\Temp\183bdf48a8a9d53bfc8b311739377670_NEAS.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\183bdf48a8a9d53bfc8b311739377670_NEAS.exe
      C:\Users\Admin\AppData\Local\Temp\183bdf48a8a9d53bfc8b311739377670_NEAS.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of UnmapMainImage
      PID:2248

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\183bdf48a8a9d53bfc8b311739377670_NEAS.exe

          Filesize

          591KB

          MD5

          e7a288cd7bd90f3c27dfe81e0d53b36c

          SHA1

          199b897ffbdc802d9dc79f34560d805c94bbbdc0

          SHA256

          dbfa2273fb82df6a8958c4871b0fe2d3a56f1d5919fbd926cb856131cb74bfa6

          SHA512

          a92e1fa76413e57a55b84cdc227c886dcfd6c8d07880ccbdde3a39f89a2969af04b0991c7d3373dec075cd75f757acfe0bca9c8c75d6619e9b8e1c8904c8ec99

        • memory/2244-0-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2244-9-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2248-10-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2248-16-0x0000000000130000-0x000000000016F000-memory.dmp

          Filesize

          252KB

        • memory/2248-11-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/2248-17-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB