Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.16b88dd96b2da25cc69e875aa2932e90.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.16b88dd96b2da25cc69e875aa2932e90.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.16b88dd96b2da25cc69e875aa2932e90.exe
-
Size
329KB
-
MD5
16b88dd96b2da25cc69e875aa2932e90
-
SHA1
d0fc757ff184dc22a0a5dcea891b4f50dc20359c
-
SHA256
1c05c4f9cd31b028ffd63ee0c7b036ff170ca0b2972ee6190163d889d1143624
-
SHA512
0b95ea91ce85d0d7ec0b09317b036bfde7f7d3b55ade3c5c9038a8c65dd3b5c02458e814ca08384baeb21841cfad881efb3574d06a353c5ca8bff5de1c149a42
-
SSDEEP
6144:MRAhhJxX7bNIAROzTuaPUD8XRufY7L3oxXTwMJU+ISZl/ux1nlKgN7+A:UsAAPaPUD1SYzJtl/u/nX+A
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{858D620E-8B9A-11D5-EBA1-F78EEEEEE983} NEAS.16b88dd96b2da25cc69e875aa2932e90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{858D620E-8B9A-11D5-EBA1-F78EEEEEE983}\StubPath = "msemk32.exe" NEAS.16b88dd96b2da25cc69e875aa2932e90.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{858D620E-8B9A-11D5-EBA1-F78EEEEEE983} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{858D620E-8B9A-11D5-EBA1-F78EEEEEE983}\StubPath = "msemk32.exe" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2172 svchost.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" NEAS.16b88dd96b2da25cc69e875aa2932e90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" NEAS.16b88dd96b2da25cc69e875aa2932e90.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" NEAS.16b88dd96b2da25cc69e875aa2932e90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\vcl32.exe NEAS.16b88dd96b2da25cc69e875aa2932e90.exe File opened for modification C:\Windows\SysWOW64\vcl32.exe NEAS.16b88dd96b2da25cc69e875aa2932e90.exe File created C:\Windows\SysWOW64\msemk32.exe NEAS.16b88dd96b2da25cc69e875aa2932e90.exe File opened for modification C:\Windows\SysWOW64\msemk32.exe NEAS.16b88dd96b2da25cc69e875aa2932e90.exe File created C:\Windows\SysWOW64\concp32.exe NEAS.16b88dd96b2da25cc69e875aa2932e90.exe File opened for modification C:\Windows\SysWOW64\concp32.exe NEAS.16b88dd96b2da25cc69e875aa2932e90.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe NEAS.16b88dd96b2da25cc69e875aa2932e90.exe File opened for modification C:\Windows\svchost.exe NEAS.16b88dd96b2da25cc69e875aa2932e90.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{858D620E-8B9A-11D5-EBA1-F78EEEEEE983} NEAS.16b88dd96b2da25cc69e875aa2932e90.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{858D620E-8B9A-11D5-EBA1-F78EEEEEE983}\sm = ebb5525fa3bcf9422c8ff945977d6af9 NEAS.16b88dd96b2da25cc69e875aa2932e90.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{858D620E-8B9A-11D5-EBA1-F78EEEEEE983}\ax = 88c2c5975e707d5594f93565c86999a0 NEAS.16b88dd96b2da25cc69e875aa2932e90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" NEAS.16b88dd96b2da25cc69e875aa2932e90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{858D620E-8B9A-11D5-EBA1-F78EEEEEE983}\v = "165" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{858D620E-8B9A-11D5-EBA1-F78EEEEEE983}\InprocServer32 NEAS.16b88dd96b2da25cc69e875aa2932e90.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{858D620E-8B9A-11D5-EBA1-F78EEEEEE983} svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{858D620E-8B9A-11D5-EBA1-F78EEEEEE983}\InprocServer32 svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{858D620E-8B9A-11D5-EBA1-F78EEEEEE983}\u0 = 658663d26f8bad325217a06063847056939f558d910ed252e05dd0113550f7fc0f4da82ff73a0681ba604c2d4f23269f svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{858D620E-8B9A-11D5-EBA1-F78EEEEEE983}\u1 = 551d2e0658054ba756fd3798fea5ffca42865cb762a31639dabd7f2cca44e226 svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{858D620E-8B9A-11D5-EBA1-F78EEEEEE983}\u2 = a54a6b702f92fdf2acd57599e2ae1608015dff41aa020117fc9bd8e2dcf4340f3fa61eb55d6f28597df90602703809d4 svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1692 NEAS.16b88dd96b2da25cc69e875aa2932e90.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2172 1692 NEAS.16b88dd96b2da25cc69e875aa2932e90.exe 28 PID 1692 wrote to memory of 2172 1692 NEAS.16b88dd96b2da25cc69e875aa2932e90.exe 28 PID 1692 wrote to memory of 2172 1692 NEAS.16b88dd96b2da25cc69e875aa2932e90.exe 28 PID 1692 wrote to memory of 2172 1692 NEAS.16b88dd96b2da25cc69e875aa2932e90.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.16b88dd96b2da25cc69e875aa2932e90.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.16b88dd96b2da25cc69e875aa2932e90.exe"1⤵
- Modifies Installed Components in the registry
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\svchost.exeC:\Windows\svchost.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies registry class
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
331KB
MD52010b0e0a8076c5c81e5e0ffbe9eaccc
SHA1eae2ecd6b8e4f262d1ee2c52a4557bb5aaa782cc
SHA2565410b49c8e0451c2715f26fe843059335d14b2301fa10ccdfd57d598ffb334bc
SHA512b975b94e7a5759702f9361b7d42a1b7ff58de22856843e75abc3cbd038209b0c1f764fc053539413386d31cdaf62a1bcca4308d23af188b637dafd5d2e35d8a7
-
Filesize
330KB
MD5e76d1499e1a07e0080e6fcb014edeeac
SHA13560a6800ab0960fadbcd66c0b2576679cabc9fd
SHA256053d2b3ea100e6940f00646fca00382af9f8632dec96222b1b3e430f60b2ffe9
SHA512f82b77db98410f2aba520fc6e89171269c0f1fad0542cff3519ee713982d309487a6e21b79018882c24499bc6e19da944e6286c038e0d78bd384e23ad90a55e5