Analysis
-
max time kernel
240s -
max time network
257s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-10-2023 20:28
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe
Resource
win7-20230831-en
General
-
Target
NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe
-
Size
279KB
-
MD5
79f7c9976d94b597ef9cec6780cf40c0
-
SHA1
24f774232a3074a891611876600507490f69e3b9
-
SHA256
12c1978f46aacf94582f319bc3379f3bfab041b2519ad5a73e63f8a96943bc16
-
SHA512
693c916f258da870c5507dbf2ac5328e50514fb8bc8571ee9cf04bb621c58b8a2c4bda301c38c139eeda0c0c38f15ab7287844334d52601d8cfc03efdd41db81
-
SSDEEP
6144:m7OQ0l65RAHqjeEnoz5OEKS64y5eUSqX5kdpfkQr7ZBfE9M:m7lRGgdoz5LDsOddkUBc9M
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe -
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 2304 FD62.tmp -
Loads dropped DLL 2 IoCs
pid Process 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2956-3-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2956-8-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2956-53-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1904-55-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2956-123-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/284-127-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2956-200-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\5C9.exe = "C:\\Program Files (x86)\\LP\\4965\\5C9.exe" NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\4965\5C9.exe NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe File opened for modification C:\Program Files (x86)\LP\4965\5C9.exe NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe File opened for modification C:\Program Files (x86)\LP\4965\FD62.tmp NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1620 explorer.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeRestorePrivilege 2640 msiexec.exe Token: SeTakeOwnershipPrivilege 2640 msiexec.exe Token: SeSecurityPrivilege 2640 msiexec.exe Token: SeShutdownPrivilege 1620 explorer.exe Token: SeShutdownPrivilege 1620 explorer.exe Token: SeShutdownPrivilege 1620 explorer.exe Token: SeShutdownPrivilege 1620 explorer.exe Token: SeShutdownPrivilege 1620 explorer.exe Token: SeShutdownPrivilege 1620 explorer.exe Token: SeShutdownPrivilege 1620 explorer.exe Token: SeShutdownPrivilege 1620 explorer.exe Token: SeShutdownPrivilege 1620 explorer.exe Token: SeShutdownPrivilege 1620 explorer.exe Token: 33 1196 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1196 AUDIODG.EXE Token: 33 1196 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1196 AUDIODG.EXE Token: SeShutdownPrivilege 1620 explorer.exe Token: SeShutdownPrivilege 1620 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe 1620 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2956 wrote to memory of 1904 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe 31 PID 2956 wrote to memory of 1904 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe 31 PID 2956 wrote to memory of 1904 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe 31 PID 2956 wrote to memory of 1904 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe 31 PID 2956 wrote to memory of 2304 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe 33 PID 2956 wrote to memory of 2304 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe 33 PID 2956 wrote to memory of 2304 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe 33 PID 2956 wrote to memory of 2304 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe 33 PID 2956 wrote to memory of 284 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe 34 PID 2956 wrote to memory of 284 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe 34 PID 2956 wrote to memory of 284 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe 34 PID 2956 wrote to memory of 284 2956 NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe 34 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\NEAS.79f7c9976d94b597ef9cec6780cf40c0.exeC:\Users\Admin\AppData\Local\Temp\NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe startC:\Users\Admin\AppData\Roaming\59655\36A49.exe%C:\Users\Admin\AppData\Roaming\596552⤵PID:1904
-
-
C:\Program Files (x86)\LP\4965\FD62.tmp"C:\Program Files (x86)\LP\4965\FD62.tmp"2⤵
- Executes dropped EXE
PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.79f7c9976d94b597ef9cec6780cf40c0.exeC:\Users\Admin\AppData\Local\Temp\NEAS.79f7c9976d94b597ef9cec6780cf40c0.exe startC:\Program Files (x86)\553C6\lvvm.exe%C:\Program Files (x86)\553C62⤵PID:284
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1620
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5241⤵
- Suspicious use of AdjustPrivilegeToken
PID:1196
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD5cb853d0e676be7b23903aa89175d8d69
SHA12066462d42c45133df60c5e5f9e8956373d191b0
SHA2567291b34528651c542a4e09036bb828f27c9f75c134d2be3aed3e1c5a0db5fe20
SHA512bf96f4c8511929ef380562004211a72821330465538db6da3367cbce387092384265e0bfd4ab54e62b742d68d668ff1457f43381d7a770fd3027f3bab1f36038
-
Filesize
99KB
MD5cb853d0e676be7b23903aa89175d8d69
SHA12066462d42c45133df60c5e5f9e8956373d191b0
SHA2567291b34528651c542a4e09036bb828f27c9f75c134d2be3aed3e1c5a0db5fe20
SHA512bf96f4c8511929ef380562004211a72821330465538db6da3367cbce387092384265e0bfd4ab54e62b742d68d668ff1457f43381d7a770fd3027f3bab1f36038
-
Filesize
1KB
MD502f80f3a9d1f2f3fa8f8054df84fd908
SHA1a261f2b9955562d1ec9cdaa95c49a7d940ebf05b
SHA2563a2ca51b84d9762dd44d1e95eda9e34309cde58c89269d77db607ae2a33982af
SHA512d18c4eba3db4ff63de712bbb439e13f9515bc274f519d03a2ab1a10023de13e1e65ee35c8ec5212c4e490b6bc93a0c8fa1dc85c970c78398f890d00b36345b97
-
Filesize
897B
MD59c6629616e81964b0ac1effa36d85b70
SHA146bdc64e2fa8b6ac3cb66e7055f35af5dfcb01ca
SHA2568688b9a3fe2caac5fb8ab40a89578076d236f7974abc5068b8803943e4ff9757
SHA5128da01e352e4683c5afea75250f08dd34cd5c19b577667f425cb5c9f746cceb8566526013c5011e9edf181f60c57e39b2ce7a2e72b6490744f324edd3cc970656
-
Filesize
99KB
MD5cb853d0e676be7b23903aa89175d8d69
SHA12066462d42c45133df60c5e5f9e8956373d191b0
SHA2567291b34528651c542a4e09036bb828f27c9f75c134d2be3aed3e1c5a0db5fe20
SHA512bf96f4c8511929ef380562004211a72821330465538db6da3367cbce387092384265e0bfd4ab54e62b742d68d668ff1457f43381d7a770fd3027f3bab1f36038
-
Filesize
99KB
MD5cb853d0e676be7b23903aa89175d8d69
SHA12066462d42c45133df60c5e5f9e8956373d191b0
SHA2567291b34528651c542a4e09036bb828f27c9f75c134d2be3aed3e1c5a0db5fe20
SHA512bf96f4c8511929ef380562004211a72821330465538db6da3367cbce387092384265e0bfd4ab54e62b742d68d668ff1457f43381d7a770fd3027f3bab1f36038