Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 19:09
Behavioral task
behavioral1
Sample
09cc1a754d7af1c3af89a75a158dffd0_NEAS.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
09cc1a754d7af1c3af89a75a158dffd0_NEAS.exe
Resource
win10v2004-20240419-en
General
-
Target
09cc1a754d7af1c3af89a75a158dffd0_NEAS.exe
-
Size
29KB
-
MD5
09cc1a754d7af1c3af89a75a158dffd0
-
SHA1
19d9fa5b810b44a91170c17bb9b9f86bc67f8e09
-
SHA256
5acbae38ca81be19ff0456f62b7a53e8a9c00b50c68973b1fc93f50b30892213
-
SHA512
af47aaf4041429246a1dddb16b3b5b5a627001ba1c8b27e0441bb608819355f8952818b9b9874598cf5d56abb62f3bd45b6c8a114457ce792d4d65f40f08bb0d
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/z:AEwVs+0jNDY1qi/q7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1584 services.exe -
resource yara_rule behavioral1/memory/2372-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/files/0x003600000001443b-6.dat upx behavioral1/memory/1584-11-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2372-17-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1584-18-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1584-23-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2372-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1584-30-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1584-32-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1584-37-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1584-42-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1584-44-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1584-49-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1584-54-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1584-56-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2372-60-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1584-61-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x0004000000004ed7-69.dat upx behavioral1/memory/2372-76-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1584-77-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2372-78-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1584-79-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2372-82-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1584-83-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 09cc1a754d7af1c3af89a75a158dffd0_NEAS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 09cc1a754d7af1c3af89a75a158dffd0_NEAS.exe File opened for modification C:\Windows\java.exe 09cc1a754d7af1c3af89a75a158dffd0_NEAS.exe File created C:\Windows\java.exe 09cc1a754d7af1c3af89a75a158dffd0_NEAS.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1584 2372 09cc1a754d7af1c3af89a75a158dffd0_NEAS.exe 28 PID 2372 wrote to memory of 1584 2372 09cc1a754d7af1c3af89a75a158dffd0_NEAS.exe 28 PID 2372 wrote to memory of 1584 2372 09cc1a754d7af1c3af89a75a158dffd0_NEAS.exe 28 PID 2372 wrote to memory of 1584 2372 09cc1a754d7af1c3af89a75a158dffd0_NEAS.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\09cc1a754d7af1c3af89a75a158dffd0_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\09cc1a754d7af1c3af89a75a158dffd0_NEAS.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD57aaefb0d535769ecb98a7b113bdcccd0
SHA1c53eb14f38d462950fe0ed20097a4a1037f2b251
SHA2560037234e87d249c84a77199efc09ac5f7bf9f097c1f76605d4a77c77386625be
SHA5123f8762e35e4e42c6ad41d63b92125049c8c58ffdb04aff497436c92f0f63ed5d0b781c502b52d3a7b1af2e010c6fe6706aa84a701f95d203920a0ff55402bf88
-
Filesize
320B
MD5bbceec591b966d5691a0f02fe529b23d
SHA10277fde6c7f1f99a14d92414046961d7275b7e2c
SHA2562f4c17541738f986eb784d0d800fa8e3ac0a2a44d51191124f1331390f80a36b
SHA512db8ec04b8fd19a4e33fd195d899d4ab778384824061e3bff0e8409708f2db85af82bcd6cb3be3117aa30e287cce7256ca40ab3cb20097802f74049b2032c3d60
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2