Analysis

  • max time kernel
    140s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 09:48

General

  • Target

    2dea36073ca0eacff91660a6bab55030_NEAS.exe

  • Size

    49KB

  • MD5

    2dea36073ca0eacff91660a6bab55030

  • SHA1

    3fa8492794c3894db86a6d2df4618d792a2ffc90

  • SHA256

    6d2f7b92f73c0493a076af67e42abebcaccb6a214e40dda25d59ea6db6abc2d9

  • SHA512

    462c952832606ead78bb3414a31589e7bad43a1706bf6ff86bd2103871e4e3c2de45128ee31b140cd7e4e0ab1bb6992aaeb3d93e0bb277cf8a213ea89a6430f3

  • SSDEEP

    768:jvQ5qDLHRdw2iPSMEk/6KxPEMb960yXb8FfbbbPTTTO:jvQoLHjw2iWPKxP7vyX4pbbbPTTTO

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2dea36073ca0eacff91660a6bab55030_NEAS.exe
    "C:\Users\Admin\AppData\Local\Temp\2dea36073ca0eacff91660a6bab55030_NEAS.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\2DEA36~1.EXE > nul
      2⤵
      • Deletes itself
      PID:2212
  • C:\Windows\Debug\qqwhost.exe
    C:\Windows\Debug\qqwhost.exe
    1⤵
    • Executes dropped EXE
    PID:2152

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\debug\qqwhost.exe

          Filesize

          49KB

          MD5

          c9b7eede076887d6635058181fc29ce0

          SHA1

          d5ee1d3cb2116cd5e10fdbc70ad44cd993195e2c

          SHA256

          510e6e028713370fdf806c83f50ed5d09f9632b840be4e45cf180247aa81c9ae

          SHA512

          56a4deac8fe6816efd2f3993c20b9b3440737afb8159f412074e168634f0e29a076e6a9c92a565e7494a1dcc566acebfea8fb29793d8c93d974acef1d8b66262