Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 16:36
Static task
static1
Behavioral task
behavioral1
Sample
f1309f225596f92f3acecc2487ee71c8_NEAS.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f1309f225596f92f3acecc2487ee71c8_NEAS.exe
Resource
win10v2004-20240508-en
General
-
Target
f1309f225596f92f3acecc2487ee71c8_NEAS.exe
-
Size
39KB
-
MD5
f1309f225596f92f3acecc2487ee71c8
-
SHA1
a56455b5c88a8790974c87cca33602ceafca90b1
-
SHA256
9ff53fa753282f58705cc50248377a4b3011ae49e9c5fa69e0604e7d672b32f9
-
SHA512
d9c6ea50df12a5a11ea0d885a3338f6a7359aa3ac534620757d217a79ba0af4845d86b22e38cbe7277288b0f08fdc45a9c408039937f9e04cb40cdd7f8d407b7
-
SSDEEP
768:JybDkdsqw8guzZFcWiVEaByckWiVECtu1MJXOs26nGMAH:JGMG8tz3cFE2kFECDzgH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1936 ykqie.exe -
Loads dropped DLL 2 IoCs
pid Process 2276 f1309f225596f92f3acecc2487ee71c8_NEAS.exe 2276 f1309f225596f92f3acecc2487ee71c8_NEAS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1936 2276 f1309f225596f92f3acecc2487ee71c8_NEAS.exe 28 PID 2276 wrote to memory of 1936 2276 f1309f225596f92f3acecc2487ee71c8_NEAS.exe 28 PID 2276 wrote to memory of 1936 2276 f1309f225596f92f3acecc2487ee71c8_NEAS.exe 28 PID 2276 wrote to memory of 1936 2276 f1309f225596f92f3acecc2487ee71c8_NEAS.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1309f225596f92f3acecc2487ee71c8_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\f1309f225596f92f3acecc2487ee71c8_NEAS.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\ykqie.exe"C:\Users\Admin\AppData\Local\Temp\ykqie.exe"2⤵
- Executes dropped EXE
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD507f4be547d8fff098d295abd10ecd7fc
SHA157bca2a1a85365a0f5153a8a658749063a678b55
SHA256c5f90075096a7ed026c99f110700619fc81811290354ffb495b70da357cb180d
SHA51227a073f951bd90f9c1dd1c66357c3b2461d708ae78240d0d046ae3b5e7aaa1e560e0aad93520413ac3bcd286169e92a3743352c5a9032c46827a382c06de7460