Analysis
-
max time kernel
19s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 10:45
Static task
static1
Behavioral task
behavioral1
Sample
4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe
Resource
win10v2004-20240426-en
General
-
Target
4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe
-
Size
72KB
-
MD5
4799f0646fc1c1ab53d2efadc5271c50
-
SHA1
2643fe57cd13808b44acfea09cc92c8395a270c1
-
SHA256
70149e2183707c24f744f16f2a4972b497ae287c9f83ff26fbe8fb864b336efb
-
SHA512
641a08c954ecfa8b466b33c09e871361936a3003d99097d85cbed94989bd483d866f13ce57e0548abb200b95b159980cea40faedc1256aa0a5206e323f96e44b
-
SSDEEP
1536:Hlqls0GgUyj5JxdA4Oj3W2Fsdq4FGgG+sxSd/PwKAEc:HQC/yj5JO3MnGgG+nPwKAEc
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2264 MSWDM.EXE 880 MSWDM.EXE 3232 4799F0646FC1C1AB53D2EFADC5271C50_NEAS.EXE 4620 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe File opened for modification C:\Windows\dev465F.tmp 4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe File opened for modification C:\Windows\dev465F.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 880 MSWDM.EXE 880 MSWDM.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1884 wrote to memory of 2264 1884 4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe 84 PID 1884 wrote to memory of 2264 1884 4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe 84 PID 1884 wrote to memory of 2264 1884 4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe 84 PID 1884 wrote to memory of 880 1884 4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe 85 PID 1884 wrote to memory of 880 1884 4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe 85 PID 1884 wrote to memory of 880 1884 4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe 85 PID 880 wrote to memory of 3232 880 MSWDM.EXE 86 PID 880 wrote to memory of 3232 880 MSWDM.EXE 86 PID 880 wrote to memory of 4620 880 MSWDM.EXE 88 PID 880 wrote to memory of 4620 880 MSWDM.EXE 88 PID 880 wrote to memory of 4620 880 MSWDM.EXE 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2264
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev465F.tmp!C:\Users\Admin\AppData\Local\Temp\4799f0646fc1c1ab53d2efadc5271c50_NEAS.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\4799F0646FC1C1AB53D2EFADC5271C50_NEAS.EXE
- Executes dropped EXE
PID:3232
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev465F.tmp!C:\Users\Admin\AppData\Local\Temp\4799F0646FC1C1AB53D2EFADC5271C50_NEAS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4620
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD537e5075bf7e3d3e7b9b6f39d43f18644
SHA13d48fceca86ced63c74ec977edf685a543a469c0
SHA25647b56d8327382fefb4c69893422e14b4bfcb42567f2a026b8b13aebb3f75cb61
SHA512082a6710a647881d235a949164a929cebc84a83e8449788f2c2b6ea8b827a17894886a2d1c5442da7636284941dbb83d6ab10275cb14ad9a4f5bab6ecb1900c9
-
Filesize
47KB
MD58281630c34398a6569e720407a61ca05
SHA1d983308e8fe1bab035342cd8d2ddc63cd9ce1ac0
SHA2568f0e45e4b02d7e47c2a82eaf263756167dbc07fb1e50eaf7f8f0b232d4d097e0
SHA512483fab964c6e7899af972bc14101ef225722ff09f544ab2e2dc37f0af781c20b3a526610922c0fe2a1d7dc53ffc7ee0ee6a030bc73b1f2b35f7ea36568945187
-
Filesize
25KB
MD5abbd49c180a2f8703f6306d6fa731fdc
SHA1d63f4bfe7f74936b2fbace803e3da6103fbf6586
SHA2565f411c0bd9ed9a42b0f07ed568c7d0cf358a83063b225a1f8f7da3296dde90f1
SHA512290dd984acc451b778f3db8c510bae7aec1d9547c3ad0a1829df731c136e4ecc9a37dc6a786cf8f1ecc4d14339aed1288af25055f450f6f953138c8d4d5c36e9