Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 16:36

General

  • Target

    f1309f225596f92f3acecc2487ee71c8_NEAS.exe

  • Size

    39KB

  • MD5

    f1309f225596f92f3acecc2487ee71c8

  • SHA1

    a56455b5c88a8790974c87cca33602ceafca90b1

  • SHA256

    9ff53fa753282f58705cc50248377a4b3011ae49e9c5fa69e0604e7d672b32f9

  • SHA512

    d9c6ea50df12a5a11ea0d885a3338f6a7359aa3ac534620757d217a79ba0af4845d86b22e38cbe7277288b0f08fdc45a9c408039937f9e04cb40cdd7f8d407b7

  • SSDEEP

    768:JybDkdsqw8guzZFcWiVEaByckWiVECtu1MJXOs26nGMAH:JGMG8tz3cFE2kFECDzgH

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1309f225596f92f3acecc2487ee71c8_NEAS.exe
    "C:\Users\Admin\AppData\Local\Temp\f1309f225596f92f3acecc2487ee71c8_NEAS.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Users\Admin\AppData\Local\Temp\ykqie.exe
      "C:\Users\Admin\AppData\Local\Temp\ykqie.exe"
      2⤵
      • Executes dropped EXE
      PID:1936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\ykqie.exe

    Filesize

    39KB

    MD5

    07f4be547d8fff098d295abd10ecd7fc

    SHA1

    57bca2a1a85365a0f5153a8a658749063a678b55

    SHA256

    c5f90075096a7ed026c99f110700619fc81811290354ffb495b70da357cb180d

    SHA512

    27a073f951bd90f9c1dd1c66357c3b2461d708ae78240d0d046ae3b5e7aaa1e560e0aad93520413ac3bcd286169e92a3743352c5a9032c46827a382c06de7460

  • memory/1936-12-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2276-1-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2276-10-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB