Analysis
-
max time kernel
122s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 20:24
Behavioral task
behavioral1
Sample
NEAS.5d0ba2adb481d9df4c126820fe7e7a70.exe
Resource
win7-20230831-en
General
-
Target
NEAS.5d0ba2adb481d9df4c126820fe7e7a70.exe
-
Size
133KB
-
MD5
5d0ba2adb481d9df4c126820fe7e7a70
-
SHA1
e484653e3fb5587f88c72512ac4567af43efcabb
-
SHA256
dce4555e1cb6a788c4ef0cc1c3df1c0f855cf1edfea4e8945616db1af23a89f6
-
SHA512
ed89dec2826a5e01ad14593b70be986273be68113962565aa03bfda93b91ab51883cd963ddf0347faa40b36377c74fee4c84d214b42c18771315002fdc7374ff
-
SSDEEP
3072:DNE9j8b3ZXgKC1hX//iASOXRJzDOD26jKNmmucu:hEebiKuX//iZOXRJ3OD26jx
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 3048 smss.exe -
Loads dropped DLL 2 IoCs
pid Process 3012 NEAS.5d0ba2adb481d9df4c126820fe7e7a70.exe 3012 NEAS.5d0ba2adb481d9df4c126820fe7e7a70.exe -
resource yara_rule behavioral1/memory/3012-0-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/files/0x001b000000015c7f-4.dat upx behavioral1/files/0x001b000000015c7f-6.dat upx behavioral1/files/0x001b000000015c7f-9.dat upx behavioral1/files/0x001b000000015c7f-11.dat upx behavioral1/memory/3048-12-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/files/0x001b000000015c7f-15.dat upx behavioral1/memory/3012-18-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/3048-17-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe NEAS.5d0ba2adb481d9df4c126820fe7e7a70.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3008 sc.exe 3032 sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3012 NEAS.5d0ba2adb481d9df4c126820fe7e7a70.exe 3048 smss.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3012 wrote to memory of 3008 3012 NEAS.5d0ba2adb481d9df4c126820fe7e7a70.exe 28 PID 3012 wrote to memory of 3008 3012 NEAS.5d0ba2adb481d9df4c126820fe7e7a70.exe 28 PID 3012 wrote to memory of 3008 3012 NEAS.5d0ba2adb481d9df4c126820fe7e7a70.exe 28 PID 3012 wrote to memory of 3008 3012 NEAS.5d0ba2adb481d9df4c126820fe7e7a70.exe 28 PID 3012 wrote to memory of 3048 3012 NEAS.5d0ba2adb481d9df4c126820fe7e7a70.exe 30 PID 3012 wrote to memory of 3048 3012 NEAS.5d0ba2adb481d9df4c126820fe7e7a70.exe 30 PID 3012 wrote to memory of 3048 3012 NEAS.5d0ba2adb481d9df4c126820fe7e7a70.exe 30 PID 3012 wrote to memory of 3048 3012 NEAS.5d0ba2adb481d9df4c126820fe7e7a70.exe 30 PID 3048 wrote to memory of 3032 3048 smss.exe 31 PID 3048 wrote to memory of 3032 3048 smss.exe 31 PID 3048 wrote to memory of 3032 3048 smss.exe 31 PID 3048 wrote to memory of 3032 3048 smss.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5d0ba2adb481d9df4c126820fe7e7a70.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5d0ba2adb481d9df4c126820fe7e7a70.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
PID:3008
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
PID:3032
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD596ba56f2e9360316878ea3e147d04691
SHA1d1f0c796fb8ea4f04948057c06af54ab5c663d88
SHA2567069ca4f4a8d2d2d0fe0855ae11825dde83606412df96305b968bae47d0ca07b
SHA512d2023e2d89362091499fb0d5d60518c49fb770cefe9f4d72f86174a048e54577627458cdec99c684c0831995e8594f485c537e2f87e38415e092241332e06c64
-
Filesize
133KB
MD596ba56f2e9360316878ea3e147d04691
SHA1d1f0c796fb8ea4f04948057c06af54ab5c663d88
SHA2567069ca4f4a8d2d2d0fe0855ae11825dde83606412df96305b968bae47d0ca07b
SHA512d2023e2d89362091499fb0d5d60518c49fb770cefe9f4d72f86174a048e54577627458cdec99c684c0831995e8594f485c537e2f87e38415e092241332e06c64
-
Filesize
133KB
MD596ba56f2e9360316878ea3e147d04691
SHA1d1f0c796fb8ea4f04948057c06af54ab5c663d88
SHA2567069ca4f4a8d2d2d0fe0855ae11825dde83606412df96305b968bae47d0ca07b
SHA512d2023e2d89362091499fb0d5d60518c49fb770cefe9f4d72f86174a048e54577627458cdec99c684c0831995e8594f485c537e2f87e38415e092241332e06c64
-
Filesize
133KB
MD596ba56f2e9360316878ea3e147d04691
SHA1d1f0c796fb8ea4f04948057c06af54ab5c663d88
SHA2567069ca4f4a8d2d2d0fe0855ae11825dde83606412df96305b968bae47d0ca07b
SHA512d2023e2d89362091499fb0d5d60518c49fb770cefe9f4d72f86174a048e54577627458cdec99c684c0831995e8594f485c537e2f87e38415e092241332e06c64
-
Filesize
133KB
MD596ba56f2e9360316878ea3e147d04691
SHA1d1f0c796fb8ea4f04948057c06af54ab5c663d88
SHA2567069ca4f4a8d2d2d0fe0855ae11825dde83606412df96305b968bae47d0ca07b
SHA512d2023e2d89362091499fb0d5d60518c49fb770cefe9f4d72f86174a048e54577627458cdec99c684c0831995e8594f485c537e2f87e38415e092241332e06c64