Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 09:48
Static task
static1
Behavioral task
behavioral1
Sample
2dea36073ca0eacff91660a6bab55030_NEAS.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2dea36073ca0eacff91660a6bab55030_NEAS.exe
Resource
win10v2004-20240419-en
General
-
Target
2dea36073ca0eacff91660a6bab55030_NEAS.exe
-
Size
49KB
-
MD5
2dea36073ca0eacff91660a6bab55030
-
SHA1
3fa8492794c3894db86a6d2df4618d792a2ffc90
-
SHA256
6d2f7b92f73c0493a076af67e42abebcaccb6a214e40dda25d59ea6db6abc2d9
-
SHA512
462c952832606ead78bb3414a31589e7bad43a1706bf6ff86bd2103871e4e3c2de45128ee31b140cd7e4e0ab1bb6992aaeb3d93e0bb277cf8a213ea89a6430f3
-
SSDEEP
768:jvQ5qDLHRdw2iPSMEk/6KxPEMb960yXb8FfbbbPTTTO:jvQoLHjw2iWPKxP7vyX4pbbbPTTTO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2212 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2152 qqwhost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\qqwhost.exe 2dea36073ca0eacff91660a6bab55030_NEAS.exe File opened for modification C:\Windows\Debug\qqwhost.exe 2dea36073ca0eacff91660a6bab55030_NEAS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2340 2dea36073ca0eacff91660a6bab55030_NEAS.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2212 2340 2dea36073ca0eacff91660a6bab55030_NEAS.exe 29 PID 2340 wrote to memory of 2212 2340 2dea36073ca0eacff91660a6bab55030_NEAS.exe 29 PID 2340 wrote to memory of 2212 2340 2dea36073ca0eacff91660a6bab55030_NEAS.exe 29 PID 2340 wrote to memory of 2212 2340 2dea36073ca0eacff91660a6bab55030_NEAS.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2dea36073ca0eacff91660a6bab55030_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\2dea36073ca0eacff91660a6bab55030_NEAS.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\2DEA36~1.EXE > nul2⤵
- Deletes itself
PID:2212
-
-
C:\Windows\Debug\qqwhost.exeC:\Windows\Debug\qqwhost.exe1⤵
- Executes dropped EXE
PID:2152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5c9b7eede076887d6635058181fc29ce0
SHA1d5ee1d3cb2116cd5e10fdbc70ad44cd993195e2c
SHA256510e6e028713370fdf806c83f50ed5d09f9632b840be4e45cf180247aa81c9ae
SHA51256a4deac8fe6816efd2f3993c20b9b3440737afb8159f412074e168634f0e29a076e6a9c92a565e7494a1dcc566acebfea8fb29793d8c93d974acef1d8b66262