Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2023, 18:36
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe
-
Size
157KB
-
MD5
7a7a773679c7c7c7d4785b70573a8443
-
SHA1
0083357ea2c1adff3fd4c86723bbbb4a33214da9
-
SHA256
b5388c8ec09bd245f6b71bf30001e43edb5dcebb7f1e7fb75ad3cfbd37617af3
-
SHA512
655595969a7e9c904c69ef24ef50a0160cd74c73ca048ff2ef59a94a73d01b4f23368292ab7017a8e835aad0ce8348fd724c78adddf223adb1fb6d12a8208a88
-
SSDEEP
3072:gyeNFuft1gx591QLSpJKZnYS6oz5FnDJT3ExnLoFTG:gyeN0fPYiLSpJ4nN6oz5PTExnLUy
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe File opened (read-only) \??\P: NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe File opened (read-only) \??\L: NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe File opened (read-only) \??\E: NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe File opened (read-only) \??\X: NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe File opened (read-only) \??\W: NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe File opened (read-only) \??\R: NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe File opened (read-only) \??\O: NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe File opened (read-only) \??\H: NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe File opened (read-only) \??\G: NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe File opened (read-only) \??\Z: NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe File opened (read-only) \??\S: NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe File opened (read-only) \??\N: NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe File opened (read-only) \??\M: NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe File opened (read-only) \??\K: NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe File opened (read-only) \??\T: NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe File opened (read-only) \??\U: NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe File opened (read-only) \??\Q: NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe File opened (read-only) \??\J: NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe File opened (read-only) \??\I: NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe File opened (read-only) \??\Y: NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\autorun.inf NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe File opened for modification C:\autorun.inf NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe File opened for modification C:\Documents and Settings\Admin\Local Settings\Application Data\Microsoft\CD Burning\autorun.inf NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\PROGRAM FILES (X86)\ADOBE\ACROBAT READER DC\READER\ACRORD32.EXE NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4736 5068 WerFault.exe 84 -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5068 NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe 5068 NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.7a7a773679c7c7c7d4785b70573a8443_JC.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 12282⤵
- Program crash
PID:4736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5068 -ip 50681⤵PID:4288
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5ac64343e4fffab70c744c58b271aa49d
SHA18622621d1f02b7dfdd6794ab442d00607cb822f0
SHA256ebb5fe1c54768c31643319d421571b1a268540d3f9b70182e60e8e1bf62a69de
SHA512965ed3eb173ee2cd0b6f5326e83d1b9952530334b9a2c34a5aaa5b39f0f243ee03e1b378a601d6ece44f78ed5e37ff70387b55047436a559ca4b92584de9d3b7
-
Filesize
126B
MD5163e20cbccefcdd42f46e43a94173c46
SHA14c7b5048e8608e2a75799e00ecf1bbb4773279ae
SHA2567780bee9df142a17e0457f3dcb2788b50fc2792370089335597d33719126fb7e
SHA512e5ac0ff6b087857799ab70f68067c9dc73eeb93ccfcad87047052380b95ade3e6eb2a7d01a0f850d548a39f4b1ebb60e299d603dbe25c31b9a3585b34a0c65a8
-
Filesize
157KB
MD564e7f552215824be3e1830188ca82d84
SHA1351edac2561f0b9315bf7f4ded4b0cb59cb0a051
SHA2569f9bcda18cfce54f0f98db673aa5036b481f50a4549a3a757e9d8e7cae86c91e
SHA5129786bf2ad4af23585b43c805f48c6216cd7f68bafc36ee7de9c4984d75150d0b8862663fae37d73d3b7acd0c8ebb4aa7499ab69f7005c89d1cfd8fc62a63aa9d
-
Filesize
157KB
MD546388981b7cc4dce0f6a71481f35f5be
SHA13eaf3bb885a6a33ca621dca5b716635f0b44836a
SHA256523aeb2530d679c02454c5e68c8ea992715ce4d357e03f0cb2d293f882abdd46
SHA512738a9b950178a52f07a3729822c2a0bebdb886db38e840ff72d3ce38e31211ff308a2e7082626819860a18066f54655ddd991a29be446ef4067c49c3a02df268