Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 16:00

General

  • Target

    d2de29815d551375518385f3c2a9ab60_NEAS.exe

  • Size

    136KB

  • MD5

    d2de29815d551375518385f3c2a9ab60

  • SHA1

    840cac4ed0c6462d3c0bedbce80878d669237dfc

  • SHA256

    344e0948073f3488f4ad763acde0f18e26a8cccf9e2e7f3b527be251a3019fc9

  • SHA512

    ba4d7a961c9b51ab6d2ee22e8f83f078137ee4dd48849b2e78ed492bb0037c82edf2730724ad7b7284ee225130c42adc087120f0fa3f3b7895c10b54627f7046

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCD:+nymCAIuZAIuYSMjoqtMHfhfGXxX1

Score
9/10

Malware Config

Signatures

  • Renames multiple (3443) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2de29815d551375518385f3c2a9ab60_NEAS.exe
    "C:\Users\Admin\AppData\Local\Temp\d2de29815d551375518385f3c2a9ab60_NEAS.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1968

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp

          Filesize

          136KB

          MD5

          ec405dda9427112e564cfdab51a27868

          SHA1

          6b14d8b1add632ef44f5e817f758b35cec18e1dc

          SHA256

          211ecde0b65cef5ba6178b2e3e8a9028a7e68008f39ce485901812bb23ad2c61

          SHA512

          20ecb17b403d312789bd558388b1f4c697f830a98327d72d97c979e761789dd0655f26c0e1e68b067db002ca19323786ad3bc1237f0be4cee449fa4163c8f8fe

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          145KB

          MD5

          7414876ea6e6da41c45ebf0f104ca517

          SHA1

          021d95ae1f58d0c79cd55ed353d7f25d0b6d9f1c

          SHA256

          7d6970bb189b43d89e8430b56d9acaec7dd11867507802625d10d6231ecb1bce

          SHA512

          607663fa0f075ca98792305e2727ad45cb4c7e228eb0e518c97c43da4abd6177c52f79033cd11f66623b6a30e47586f93b0e8999cfea1ba239cf755572cb1fa9

        • memory/1968-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1968-650-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB