Analysis
-
max time kernel
21s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 16:02
Static task
static1
Behavioral task
behavioral1
Sample
d384f2b1c906e4464457f2857ba48210_NEAS.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
d384f2b1c906e4464457f2857ba48210_NEAS.exe
Resource
win10v2004-20240226-en
General
-
Target
d384f2b1c906e4464457f2857ba48210_NEAS.exe
-
Size
534KB
-
MD5
d384f2b1c906e4464457f2857ba48210
-
SHA1
0097320c6d75ed567621af7dc2144782e11b8cae
-
SHA256
38615d2f33f81f8dc86593ba99b28f0bdb96a3edc806c1af401c28aa3ba83615
-
SHA512
8e94893f9f4583fe8dd88607aabd109b5fa212165d2984db2954d9d6d528a432a81940425c3baf6013520db10358f27c95cf4b4816967686562371aa8cd8b82d
-
SSDEEP
6144:wlj7cMnU+OEXu78n5Qw0tneDA/sqhleIc0HftDrkYY1hj63hgDonsogCh6NEpAF9:wlbU+I85bM3npxYfj63hgD1Zie
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1668 MSWDM.EXE 2604 MSWDM.EXE 2968 D384F2B1C906E4464457F2857BA48210_NEAS.EXE 2996 MSWDM.EXE -
Loads dropped DLL 1 IoCs
pid Process 2604 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" d384f2b1c906e4464457f2857ba48210_NEAS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" d384f2b1c906e4464457f2857ba48210_NEAS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\dev1610.tmp d384f2b1c906e4464457f2857ba48210_NEAS.exe File opened for modification C:\Windows\dev1610.tmp MSWDM.EXE File created C:\WINDOWS\MSWDM.EXE d384f2b1c906e4464457f2857ba48210_NEAS.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2604 MSWDM.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2968 D384F2B1C906E4464457F2857BA48210_NEAS.EXE 2968 D384F2B1C906E4464457F2857BA48210_NEAS.EXE 2968 D384F2B1C906E4464457F2857BA48210_NEAS.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2100 wrote to memory of 1668 2100 d384f2b1c906e4464457f2857ba48210_NEAS.exe 28 PID 2100 wrote to memory of 1668 2100 d384f2b1c906e4464457f2857ba48210_NEAS.exe 28 PID 2100 wrote to memory of 1668 2100 d384f2b1c906e4464457f2857ba48210_NEAS.exe 28 PID 2100 wrote to memory of 1668 2100 d384f2b1c906e4464457f2857ba48210_NEAS.exe 28 PID 2100 wrote to memory of 2604 2100 d384f2b1c906e4464457f2857ba48210_NEAS.exe 29 PID 2100 wrote to memory of 2604 2100 d384f2b1c906e4464457f2857ba48210_NEAS.exe 29 PID 2100 wrote to memory of 2604 2100 d384f2b1c906e4464457f2857ba48210_NEAS.exe 29 PID 2100 wrote to memory of 2604 2100 d384f2b1c906e4464457f2857ba48210_NEAS.exe 29 PID 2604 wrote to memory of 2968 2604 MSWDM.EXE 30 PID 2604 wrote to memory of 2968 2604 MSWDM.EXE 30 PID 2604 wrote to memory of 2968 2604 MSWDM.EXE 30 PID 2604 wrote to memory of 2968 2604 MSWDM.EXE 30 PID 2604 wrote to memory of 2968 2604 MSWDM.EXE 30 PID 2604 wrote to memory of 2968 2604 MSWDM.EXE 30 PID 2604 wrote to memory of 2968 2604 MSWDM.EXE 30 PID 2604 wrote to memory of 2996 2604 MSWDM.EXE 31 PID 2604 wrote to memory of 2996 2604 MSWDM.EXE 31 PID 2604 wrote to memory of 2996 2604 MSWDM.EXE 31 PID 2604 wrote to memory of 2996 2604 MSWDM.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d384f2b1c906e4464457f2857ba48210_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\d384f2b1c906e4464457f2857ba48210_NEAS.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1668
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev1610.tmp!C:\Users\Admin\AppData\Local\Temp\d384f2b1c906e4464457f2857ba48210_NEAS.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\D384F2B1C906E4464457F2857BA48210_NEAS.EXE
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2968
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev1610.tmp!C:\Users\Admin\AppData\Local\Temp\D384F2B1C906E4464457F2857BA48210_NEAS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2996
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
534KB
MD57841f4f92538b1b45b58f345482819e2
SHA167a8677634553adff798afe5f8c5f0c3ae2feadd
SHA2567edeaabc5a42372007fdb714764fa2af9211957a350fa3e681119f8adefed6a6
SHA5126b3b9f097d0f3988f5275c17b3ea9e768c7ba585dfb7ea2b5af074161ea2b9a200287263f2bc0548bbda51c4dce2fa23acc6dd04e825bf8f9f9243192c8b898e
-
Filesize
453KB
MD596f7cb9f7481a279bd4bc0681a3b993e
SHA1deaedb5becc6c0bd263d7cf81e0909b912a1afd4
SHA256d2893c55259772b554cb887d3e2e1f9c67f5cd5abac2ab9f4720dec507cdd290
SHA512694d2da36df04db25cc5972f7cc180b77e1cb0c3b5be8b69fe7e2d4e59555efb8aa7e50b1475ad5196ca638dabde2c796ae6faeb4a31f38166838cd1cc028149
-
Filesize
80KB
MD53bad16e6b9791239f0136f664c22ace8
SHA1a92f82890a3ac797b3e5d51840be75376e751a0f
SHA2566b5e6c7bd133a0b2972be2796b0a52f0fa8713d9a9c27d25fdca7e9fcb8d1b17
SHA512ac2b8b671958cfbd4b4966bddbeb3375c6b29089c90364aeb3a3e4836878970e65fa74ca0b5f553a9164b33c630534722306ee4e7b6b36c432e517c503d23dfd