Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2023, 20:31

General

  • Target

    NEAS.902cbcb75400fec1257f9ffe3e0f6b60.exe

  • Size

    244KB

  • MD5

    902cbcb75400fec1257f9ffe3e0f6b60

  • SHA1

    d0b4a0178fa3ae49e9404cedab6740fac8307a12

  • SHA256

    f1c998e5fc20c7681f2af0da9360af52a77500193d74b775066370fb1683514e

  • SHA512

    721521e0d83e7c15bc3d28b2ee3464c051dcdd4442d28af1861e2f7ca246553210ebece010b340885e6e33c1c78973663790bf97d683ca27dca196eb446610aa

  • SSDEEP

    6144:vXXvkVpbfwmz0784vdR2Hkq833OhKVXxAiWIyfc2:fUdz0784FUEq86kx8IQ

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.902cbcb75400fec1257f9ffe3e0f6b60.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.902cbcb75400fec1257f9ffe3e0f6b60.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4192
    • C:\Users\Admin\AppData\Local\Temp\ku4RLvSincpTUsy.exe
      C:\Users\Admin\AppData\Local\Temp\ku4RLvSincpTUsy.exe
      2⤵
      • Executes dropped EXE
      PID:900
    • C:\Windows\spoolsv.exe
      "C:\Windows\spoolsv.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      PID:4120

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

          Filesize

          347KB

          MD5

          01e2a2461660b14a187acb7c8a56c5dd

          SHA1

          ec389f7b55fc0409fa8937572081d900ac4b03e4

          SHA256

          32e16e07f3bf2c15319aeaaf3c0bdefb6cb6c99a5f4fb16951888374f33ed1aa

          SHA512

          4a89e9991422f1520f4a236fbc1d5e467d70f7a3119a4e0036520b02d9f7cf25277f0630ca9774ec1bd886c3de981d26055c0ca51afa5709dd57f22ba45520f5

        • C:\Users\Admin\AppData\Local\Temp\ku4RLvSincpTUsy.exe

          Filesize

          219KB

          MD5

          e2312f199976d03a7cf41e453c5af246

          SHA1

          c723bf05f7132c9b66c4f91d6cc363d08b4ed622

          SHA256

          84fe7824717bb55d7f32c7487e37012a1bc6cd4c8c0202be4bfb07e770f8dc51

          SHA512

          a5cad97d8bcf893b79eed436ae8df232d7e53df86a0ed38b381c128c5d8c76c0caad41407ed564f2ea2725236eb98ea6d29413886ea22371920bf2b498b49686

        • C:\Users\Admin\AppData\Local\Temp\ku4RLvSincpTUsy.exe

          Filesize

          219KB

          MD5

          e2312f199976d03a7cf41e453c5af246

          SHA1

          c723bf05f7132c9b66c4f91d6cc363d08b4ed622

          SHA256

          84fe7824717bb55d7f32c7487e37012a1bc6cd4c8c0202be4bfb07e770f8dc51

          SHA512

          a5cad97d8bcf893b79eed436ae8df232d7e53df86a0ed38b381c128c5d8c76c0caad41407ed564f2ea2725236eb98ea6d29413886ea22371920bf2b498b49686

        • C:\Windows\spoolsv.exe

          Filesize

          25KB

          MD5

          82071fd2379c64429acf376487fcddff

          SHA1

          2da42c7eaa62ecee65757b441c939f12b52228fb

          SHA256

          272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

          SHA512

          194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb

        • C:\Windows\spoolsv.exe

          Filesize

          25KB

          MD5

          82071fd2379c64429acf376487fcddff

          SHA1

          2da42c7eaa62ecee65757b441c939f12b52228fb

          SHA256

          272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

          SHA512

          194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb