Analysis
-
max time kernel
20s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 10:45
Static task
static1
Behavioral task
behavioral1
Sample
4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe
Resource
win10v2004-20240426-en
General
-
Target
4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe
-
Size
72KB
-
MD5
4799f0646fc1c1ab53d2efadc5271c50
-
SHA1
2643fe57cd13808b44acfea09cc92c8395a270c1
-
SHA256
70149e2183707c24f744f16f2a4972b497ae287c9f83ff26fbe8fb864b336efb
-
SHA512
641a08c954ecfa8b466b33c09e871361936a3003d99097d85cbed94989bd483d866f13ce57e0548abb200b95b159980cea40faedc1256aa0a5206e323f96e44b
-
SSDEEP
1536:Hlqls0GgUyj5JxdA4Oj3W2Fsdq4FGgG+sxSd/PwKAEc:HQC/yj5JO3MnGgG+nPwKAEc
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2960 MSWDM.EXE 2820 MSWDM.EXE 2156 4799F0646FC1C1AB53D2EFADC5271C50_NEAS.EXE 2580 MSWDM.EXE -
Loads dropped DLL 3 IoCs
pid Process 2820 MSWDM.EXE 2820 MSWDM.EXE 2616 Process not Found -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe File opened for modification C:\Windows\devA6C.tmp 4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe File opened for modification C:\Windows\devA6C.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2820 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2960 2888 4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe 28 PID 2888 wrote to memory of 2960 2888 4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe 28 PID 2888 wrote to memory of 2960 2888 4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe 28 PID 2888 wrote to memory of 2960 2888 4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe 28 PID 2888 wrote to memory of 2820 2888 4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe 29 PID 2888 wrote to memory of 2820 2888 4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe 29 PID 2888 wrote to memory of 2820 2888 4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe 29 PID 2888 wrote to memory of 2820 2888 4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe 29 PID 2820 wrote to memory of 2156 2820 MSWDM.EXE 30 PID 2820 wrote to memory of 2156 2820 MSWDM.EXE 30 PID 2820 wrote to memory of 2156 2820 MSWDM.EXE 30 PID 2820 wrote to memory of 2156 2820 MSWDM.EXE 30 PID 2820 wrote to memory of 2580 2820 MSWDM.EXE 32 PID 2820 wrote to memory of 2580 2820 MSWDM.EXE 32 PID 2820 wrote to memory of 2580 2820 MSWDM.EXE 32 PID 2820 wrote to memory of 2580 2820 MSWDM.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2960
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\devA6C.tmp!C:\Users\Admin\AppData\Local\Temp\4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\4799F0646FC1C1AB53D2EFADC5271C50_NEAS.EXE
- Executes dropped EXE
PID:2156
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\devA6C.tmp!C:\Users\Admin\AppData\Local\Temp\4799F0646FC1C1AB53D2EFADC5271C50_NEAS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2580
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5e1dc8ce669eb94be237c15cfe7c86a1c
SHA1817cb4f5df41bac6c99d214a4827b1bae16f468c
SHA2562841c61754df0c29c009e17f06880bceab1499604e9efd9d52f34dac19348f15
SHA5127314fe83dd6450fdc62683c5e403e6fe5a11bbfbaa39ed45ec7f42a8eedd8e30b05ccc94a29b515bfe9bb2b2b9fc2be786f0ce84722676119baffe1dc2f7f26d
-
Filesize
25KB
MD5abbd49c180a2f8703f6306d6fa731fdc
SHA1d63f4bfe7f74936b2fbace803e3da6103fbf6586
SHA2565f411c0bd9ed9a42b0f07ed568c7d0cf358a83063b225a1f8f7da3296dde90f1
SHA512290dd984acc451b778f3db8c510bae7aec1d9547c3ad0a1829df731c136e4ecc9a37dc6a786cf8f1ecc4d14339aed1288af25055f450f6f953138c8d4d5c36e9
-
Filesize
47KB
MD58281630c34398a6569e720407a61ca05
SHA1d983308e8fe1bab035342cd8d2ddc63cd9ce1ac0
SHA2568f0e45e4b02d7e47c2a82eaf263756167dbc07fb1e50eaf7f8f0b232d4d097e0
SHA512483fab964c6e7899af972bc14101ef225722ff09f544ab2e2dc37f0af781c20b3a526610922c0fe2a1d7dc53ffc7ee0ee6a030bc73b1f2b35f7ea36568945187