Analysis
-
max time kernel
149s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 17:09
Static task
static1
Behavioral task
behavioral1
Sample
e63b7bb131a0365aa5b104de8da00670_NEAS.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e63b7bb131a0365aa5b104de8da00670_NEAS.exe
Resource
win10v2004-20240426-en
General
-
Target
e63b7bb131a0365aa5b104de8da00670_NEAS.exe
-
Size
395KB
-
MD5
e63b7bb131a0365aa5b104de8da00670
-
SHA1
8c267830f443dce7dff358cf0e9ccb1ff513f1ee
-
SHA256
a541c38bdeb1258474174de879ba86b50c1164636fc9ccabd6f986806fff99cf
-
SHA512
d8269851d62b924dcb171bfac25048b9a743e0288784cf2230d8a833ec08c1feffad1b76f9a6ec54c378b386475bf68b6766e12f9ae2d454570bc9691f611a1d
-
SSDEEP
6144:4jlYKRF/LReWAsUy3Qea9Sc3P5VkiKW8iYgsiWW:4jauDReWp+Sc/5VItiYi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1356 fevumu.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\fevumu.exe" fevumu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4424 wrote to memory of 1356 4424 e63b7bb131a0365aa5b104de8da00670_NEAS.exe 82 PID 4424 wrote to memory of 1356 4424 e63b7bb131a0365aa5b104de8da00670_NEAS.exe 82 PID 4424 wrote to memory of 1356 4424 e63b7bb131a0365aa5b104de8da00670_NEAS.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\e63b7bb131a0365aa5b104de8da00670_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\e63b7bb131a0365aa5b104de8da00670_NEAS.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\ProgramData\fevumu.exe"C:\ProgramData\fevumu.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD54beffcf7de2c0b3f52be734737d2d31e
SHA1f0be7c80bfe3b74fe3e9c638e7c85a277c3811f2
SHA25699c5e2691642f49d44580463431e826d41208ba84e37a3c133ac532759fde3c7
SHA5127bd2158f441c2d776dd7ad57b4882ee4056351dbe5201a5c2ce31bbab7ac52a2deb649485f66dcb298ef6cf1e9ef5f9ab2225d24f07b12f3625e2fb501512736
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
258KB
MD5eebecc5a7dd1e1ce563877dc31c50202
SHA1d9adc8afda99d2e73662831ab0f9fbe57154e5e8
SHA256ecec8568033f83b611f4eb7c81dc121746a8f135330c58e126fb178b72241085
SHA51290cacd597a1f83d2b066de936ab42ec97554a47299ee7df988a2ce8b4bc146ef3c3d5de8002c29ac3f947f3834485e35c3112bc31dc44c6845383585e7d1d9e7