Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.902cbcb75400fec1257f9ffe3e0f6b60.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.902cbcb75400fec1257f9ffe3e0f6b60.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.902cbcb75400fec1257f9ffe3e0f6b60.exe
-
Size
244KB
-
MD5
902cbcb75400fec1257f9ffe3e0f6b60
-
SHA1
d0b4a0178fa3ae49e9404cedab6740fac8307a12
-
SHA256
f1c998e5fc20c7681f2af0da9360af52a77500193d74b775066370fb1683514e
-
SHA512
721521e0d83e7c15bc3d28b2ee3464c051dcdd4442d28af1861e2f7ca246553210ebece010b340885e6e33c1c78973663790bf97d683ca27dca196eb446610aa
-
SSDEEP
6144:vXXvkVpbfwmz0784vdR2Hkq833OhKVXxAiWIyfc2:fUdz0784FUEq86kx8IQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 900 ku4RLvSincpTUsy.exe 4120 spoolsv.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\spoolsv = "C:\\Windows\\spoolsv.exe" spoolsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\spoolsv = "C:\\Windows\\spoolsv.exe" NEAS.902cbcb75400fec1257f9ffe3e0f6b60.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\spoolsv.exe NEAS.902cbcb75400fec1257f9ffe3e0f6b60.exe File created C:\Windows\spoolsv.exe spoolsv.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\https:\onsapay.com\loader spoolsv.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4192 NEAS.902cbcb75400fec1257f9ffe3e0f6b60.exe Token: SeDebugPrivilege 4120 spoolsv.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4192 wrote to memory of 900 4192 NEAS.902cbcb75400fec1257f9ffe3e0f6b60.exe 86 PID 4192 wrote to memory of 900 4192 NEAS.902cbcb75400fec1257f9ffe3e0f6b60.exe 86 PID 4192 wrote to memory of 4120 4192 NEAS.902cbcb75400fec1257f9ffe3e0f6b60.exe 87 PID 4192 wrote to memory of 4120 4192 NEAS.902cbcb75400fec1257f9ffe3e0f6b60.exe 87 PID 4192 wrote to memory of 4120 4192 NEAS.902cbcb75400fec1257f9ffe3e0f6b60.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.902cbcb75400fec1257f9ffe3e0f6b60.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.902cbcb75400fec1257f9ffe3e0f6b60.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\ku4RLvSincpTUsy.exeC:\Users\Admin\AppData\Local\Temp\ku4RLvSincpTUsy.exe2⤵
- Executes dropped EXE
PID:900
-
-
C:\Windows\spoolsv.exe"C:\Windows\spoolsv.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:4120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
347KB
MD501e2a2461660b14a187acb7c8a56c5dd
SHA1ec389f7b55fc0409fa8937572081d900ac4b03e4
SHA25632e16e07f3bf2c15319aeaaf3c0bdefb6cb6c99a5f4fb16951888374f33ed1aa
SHA5124a89e9991422f1520f4a236fbc1d5e467d70f7a3119a4e0036520b02d9f7cf25277f0630ca9774ec1bd886c3de981d26055c0ca51afa5709dd57f22ba45520f5
-
Filesize
219KB
MD5e2312f199976d03a7cf41e453c5af246
SHA1c723bf05f7132c9b66c4f91d6cc363d08b4ed622
SHA25684fe7824717bb55d7f32c7487e37012a1bc6cd4c8c0202be4bfb07e770f8dc51
SHA512a5cad97d8bcf893b79eed436ae8df232d7e53df86a0ed38b381c128c5d8c76c0caad41407ed564f2ea2725236eb98ea6d29413886ea22371920bf2b498b49686
-
Filesize
219KB
MD5e2312f199976d03a7cf41e453c5af246
SHA1c723bf05f7132c9b66c4f91d6cc363d08b4ed622
SHA25684fe7824717bb55d7f32c7487e37012a1bc6cd4c8c0202be4bfb07e770f8dc51
SHA512a5cad97d8bcf893b79eed436ae8df232d7e53df86a0ed38b381c128c5d8c76c0caad41407ed564f2ea2725236eb98ea6d29413886ea22371920bf2b498b49686
-
Filesize
25KB
MD582071fd2379c64429acf376487fcddff
SHA12da42c7eaa62ecee65757b441c939f12b52228fb
SHA256272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8
SHA512194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb
-
Filesize
25KB
MD582071fd2379c64429acf376487fcddff
SHA12da42c7eaa62ecee65757b441c939f12b52228fb
SHA256272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8
SHA512194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb