Analysis
-
max time kernel
24s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 16:02
Static task
static1
Behavioral task
behavioral1
Sample
d384f2b1c906e4464457f2857ba48210_NEAS.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
d384f2b1c906e4464457f2857ba48210_NEAS.exe
Resource
win10v2004-20240226-en
General
-
Target
d384f2b1c906e4464457f2857ba48210_NEAS.exe
-
Size
534KB
-
MD5
d384f2b1c906e4464457f2857ba48210
-
SHA1
0097320c6d75ed567621af7dc2144782e11b8cae
-
SHA256
38615d2f33f81f8dc86593ba99b28f0bdb96a3edc806c1af401c28aa3ba83615
-
SHA512
8e94893f9f4583fe8dd88607aabd109b5fa212165d2984db2954d9d6d528a432a81940425c3baf6013520db10358f27c95cf4b4816967686562371aa8cd8b82d
-
SSDEEP
6144:wlj7cMnU+OEXu78n5Qw0tneDA/sqhleIc0HftDrkYY1hj63hgDonsogCh6NEpAF9:wlbU+I85bM3npxYfj63hgD1Zie
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4892 MSWDM.EXE 4232 MSWDM.EXE 4804 D384F2B1C906E4464457F2857BA48210_NEAS.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" d384f2b1c906e4464457f2857ba48210_NEAS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" d384f2b1c906e4464457f2857ba48210_NEAS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\devE0CB.tmp d384f2b1c906e4464457f2857ba48210_NEAS.exe File created C:\WINDOWS\MSWDM.EXE d384f2b1c906e4464457f2857ba48210_NEAS.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4232 MSWDM.EXE 4232 MSWDM.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4804 D384F2B1C906E4464457F2857BA48210_NEAS.EXE 4804 D384F2B1C906E4464457F2857BA48210_NEAS.EXE 4804 D384F2B1C906E4464457F2857BA48210_NEAS.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2220 wrote to memory of 4892 2220 d384f2b1c906e4464457f2857ba48210_NEAS.exe 90 PID 2220 wrote to memory of 4892 2220 d384f2b1c906e4464457f2857ba48210_NEAS.exe 90 PID 2220 wrote to memory of 4892 2220 d384f2b1c906e4464457f2857ba48210_NEAS.exe 90 PID 2220 wrote to memory of 4232 2220 d384f2b1c906e4464457f2857ba48210_NEAS.exe 91 PID 2220 wrote to memory of 4232 2220 d384f2b1c906e4464457f2857ba48210_NEAS.exe 91 PID 2220 wrote to memory of 4232 2220 d384f2b1c906e4464457f2857ba48210_NEAS.exe 91 PID 4232 wrote to memory of 4804 4232 MSWDM.EXE 92 PID 4232 wrote to memory of 4804 4232 MSWDM.EXE 92 PID 4232 wrote to memory of 4804 4232 MSWDM.EXE 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\d384f2b1c906e4464457f2857ba48210_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\d384f2b1c906e4464457f2857ba48210_NEAS.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4892
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\devE0CB.tmp!C:\Users\Admin\AppData\Local\Temp\d384f2b1c906e4464457f2857ba48210_NEAS.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\D384F2B1C906E4464457F2857BA48210_NEAS.EXE
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4804
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1348 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:4760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD53bad16e6b9791239f0136f664c22ace8
SHA1a92f82890a3ac797b3e5d51840be75376e751a0f
SHA2566b5e6c7bd133a0b2972be2796b0a52f0fa8713d9a9c27d25fdca7e9fcb8d1b17
SHA512ac2b8b671958cfbd4b4966bddbeb3375c6b29089c90364aeb3a3e4836878970e65fa74ca0b5f553a9164b33c630534722306ee4e7b6b36c432e517c503d23dfd
-
Filesize
453KB
MD596f7cb9f7481a279bd4bc0681a3b993e
SHA1deaedb5becc6c0bd263d7cf81e0909b912a1afd4
SHA256d2893c55259772b554cb887d3e2e1f9c67f5cd5abac2ab9f4720dec507cdd290
SHA512694d2da36df04db25cc5972f7cc180b77e1cb0c3b5be8b69fe7e2d4e59555efb8aa7e50b1475ad5196ca638dabde2c796ae6faeb4a31f38166838cd1cc028149