Analysis
-
max time kernel
132s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 16:38
Static task
static1
Behavioral task
behavioral1
Sample
de583ee141ae46f8bae202af87848fc0_NEAS.exe
Resource
win7-20240419-en
General
-
Target
de583ee141ae46f8bae202af87848fc0_NEAS.exe
-
Size
138KB
-
MD5
de583ee141ae46f8bae202af87848fc0
-
SHA1
a6df0a190c6fdb96d22647697945259ed6fe80b7
-
SHA256
a9a144934a945e5dfc13f4333e67d5b82b65463d43525e116df73e445f243891
-
SHA512
ad862df18bb6547ddb4e928b1ccdb06bf78e88f062e5207a1ccd79c01a426c43ad7f950c3ee5eba3c414b3a38b50f87f002a95b0b30af0d5c0e217f2324346ab
-
SSDEEP
1536:rC2/fYuPfbESFYXRWhpKRycRd57JkIqFHhzm4hWru/BzihhMN45MF5FvHP132xPT:r7YubEwYXRWhpAJUHhzm4hUukS6Kmech
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3084 smss.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe de583ee141ae46f8bae202af87848fc0_NEAS.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4608 sc.exe 3360 sc.exe 4244 sc.exe 1228 sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3916 de583ee141ae46f8bae202af87848fc0_NEAS.exe 3084 smss.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3916 wrote to memory of 4608 3916 de583ee141ae46f8bae202af87848fc0_NEAS.exe 84 PID 3916 wrote to memory of 4608 3916 de583ee141ae46f8bae202af87848fc0_NEAS.exe 84 PID 3916 wrote to memory of 4608 3916 de583ee141ae46f8bae202af87848fc0_NEAS.exe 84 PID 3916 wrote to memory of 3360 3916 de583ee141ae46f8bae202af87848fc0_NEAS.exe 86 PID 3916 wrote to memory of 3360 3916 de583ee141ae46f8bae202af87848fc0_NEAS.exe 86 PID 3916 wrote to memory of 3360 3916 de583ee141ae46f8bae202af87848fc0_NEAS.exe 86 PID 3916 wrote to memory of 3084 3916 de583ee141ae46f8bae202af87848fc0_NEAS.exe 87 PID 3916 wrote to memory of 3084 3916 de583ee141ae46f8bae202af87848fc0_NEAS.exe 87 PID 3916 wrote to memory of 3084 3916 de583ee141ae46f8bae202af87848fc0_NEAS.exe 87 PID 3084 wrote to memory of 4244 3084 smss.exe 89 PID 3084 wrote to memory of 4244 3084 smss.exe 89 PID 3084 wrote to memory of 4244 3084 smss.exe 89 PID 3084 wrote to memory of 1228 3084 smss.exe 91 PID 3084 wrote to memory of 1228 3084 smss.exe 91 PID 3084 wrote to memory of 1228 3084 smss.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\de583ee141ae46f8bae202af87848fc0_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\de583ee141ae46f8bae202af87848fc0_NEAS.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop SharedAccess2⤵
- Launches sc.exe
PID:4608
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
PID:3360
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop SharedAccess3⤵
- Launches sc.exe
PID:4244
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
PID:1228
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD5458bdd04dd5464b40732fe01bd05de78
SHA1096880e1ed4d1d313d48f678f76e352c81ba1b9d
SHA256c328b9c191a5021f14b1eb45956793c4f2045b2a4e81a25a9191e1405327dc76
SHA512912dd70550622450061bde5f593b89f0774df28fdb364cc38ee622619d43af88bee31b858c71cc3b0280f05a59d746c37bc175cc787709d9d87d2b94431a3db3