Analysis

  • max time kernel
    21s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2024 16:02

General

  • Target

    d384f2b1c906e4464457f2857ba48210_NEAS.exe

  • Size

    534KB

  • MD5

    d384f2b1c906e4464457f2857ba48210

  • SHA1

    0097320c6d75ed567621af7dc2144782e11b8cae

  • SHA256

    38615d2f33f81f8dc86593ba99b28f0bdb96a3edc806c1af401c28aa3ba83615

  • SHA512

    8e94893f9f4583fe8dd88607aabd109b5fa212165d2984db2954d9d6d528a432a81940425c3baf6013520db10358f27c95cf4b4816967686562371aa8cd8b82d

  • SSDEEP

    6144:wlj7cMnU+OEXu78n5Qw0tneDA/sqhleIc0HftDrkYY1hj63hgDonsogCh6NEpAF9:wlbU+I85bM3npxYfj63hgD1Zie

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d384f2b1c906e4464457f2857ba48210_NEAS.exe
    "C:\Users\Admin\AppData\Local\Temp\d384f2b1c906e4464457f2857ba48210_NEAS.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1668
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev1610.tmp!C:\Users\Admin\AppData\Local\Temp\d384f2b1c906e4464457f2857ba48210_NEAS.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Users\Admin\AppData\Local\Temp\D384F2B1C906E4464457F2857BA48210_NEAS.EXE
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2968
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev1610.tmp!C:\Users\Admin\AppData\Local\Temp\D384F2B1C906E4464457F2857BA48210_NEAS.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\D384F2B1C906E4464457F2857BA48210_NEAS.EXE

    Filesize

    534KB

    MD5

    7841f4f92538b1b45b58f345482819e2

    SHA1

    67a8677634553adff798afe5f8c5f0c3ae2feadd

    SHA256

    7edeaabc5a42372007fdb714764fa2af9211957a350fa3e681119f8adefed6a6

    SHA512

    6b3b9f097d0f3988f5275c17b3ea9e768c7ba585dfb7ea2b5af074161ea2b9a200287263f2bc0548bbda51c4dce2fa23acc6dd04e825bf8f9f9243192c8b898e

  • C:\Users\Admin\AppData\Local\Temp\d384f2b1c906e4464457f2857ba48210_NEAS.exe

    Filesize

    453KB

    MD5

    96f7cb9f7481a279bd4bc0681a3b993e

    SHA1

    deaedb5becc6c0bd263d7cf81e0909b912a1afd4

    SHA256

    d2893c55259772b554cb887d3e2e1f9c67f5cd5abac2ab9f4720dec507cdd290

    SHA512

    694d2da36df04db25cc5972f7cc180b77e1cb0c3b5be8b69fe7e2d4e59555efb8aa7e50b1475ad5196ca638dabde2c796ae6faeb4a31f38166838cd1cc028149

  • C:\Windows\MSWDM.EXE

    Filesize

    80KB

    MD5

    3bad16e6b9791239f0136f664c22ace8

    SHA1

    a92f82890a3ac797b3e5d51840be75376e751a0f

    SHA256

    6b5e6c7bd133a0b2972be2796b0a52f0fa8713d9a9c27d25fdca7e9fcb8d1b17

    SHA512

    ac2b8b671958cfbd4b4966bddbeb3375c6b29089c90364aeb3a3e4836878970e65fa74ca0b5f553a9164b33c630534722306ee4e7b6b36c432e517c503d23dfd

  • memory/1668-15-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1668-34-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2100-0-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2100-14-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2100-6-0x0000000000260000-0x000000000027B000-memory.dmp

    Filesize

    108KB

  • memory/2604-23-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2604-33-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2996-30-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB