Analysis
-
max time kernel
230s -
max time network
54s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14-10-2023 08:19
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.e20998ffe08fbe65cc318ececef98ff0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.e20998ffe08fbe65cc318ececef98ff0.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.e20998ffe08fbe65cc318ececef98ff0.exe
-
Size
101KB
-
MD5
e20998ffe08fbe65cc318ececef98ff0
-
SHA1
1fb9b377e85a0cc772461313d69a0f65a2c3fb35
-
SHA256
59e6d48f1bf89da33d2fcb2165476cfdc8c151f7c5a3bbd9b7dcec223c4ccd0f
-
SHA512
c160371e4980ff3952fbbd68b2b7103c8696f4925cef9fdf83dbea9c4f59c1a91c087ce6de0465132487a76a67ef7594965f14e5ec508086020b9d94ea0a4fb9
-
SSDEEP
1536:JfgLdQAQfcfymNa2Go0VeoE4p9nV5Icq+cRXZ2N4xHuF8sQWNe5lb1PW:JftffjmNfGvE4pL4zv2NL6sRe5lxe
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3036 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2696 Logo1_.exe 3008 NEAS.e20998ffe08fbe65cc318ececef98ff0.exe 1524 NEAS.e20998ffe08fbe65cc318ececef98ff0.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ms\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Etc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ga\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\include\win32\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Atlantic\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fur\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\te\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\windows-amd64\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\SystemV\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe NEAS.e20998ffe08fbe65cc318ececef98ff0.exe File created C:\Windows\Logo1_.exe NEAS.e20998ffe08fbe65cc318ececef98ff0.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2696 Logo1_.exe 2696 Logo1_.exe 2696 Logo1_.exe 2696 Logo1_.exe 2696 Logo1_.exe 2696 Logo1_.exe 2696 Logo1_.exe 2696 Logo1_.exe 2696 Logo1_.exe 2696 Logo1_.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2924 wrote to memory of 3036 2924 NEAS.e20998ffe08fbe65cc318ececef98ff0.exe 27 PID 2924 wrote to memory of 3036 2924 NEAS.e20998ffe08fbe65cc318ececef98ff0.exe 27 PID 2924 wrote to memory of 3036 2924 NEAS.e20998ffe08fbe65cc318ececef98ff0.exe 27 PID 2924 wrote to memory of 3036 2924 NEAS.e20998ffe08fbe65cc318ececef98ff0.exe 27 PID 2924 wrote to memory of 2696 2924 NEAS.e20998ffe08fbe65cc318ececef98ff0.exe 29 PID 2924 wrote to memory of 2696 2924 NEAS.e20998ffe08fbe65cc318ececef98ff0.exe 29 PID 2924 wrote to memory of 2696 2924 NEAS.e20998ffe08fbe65cc318ececef98ff0.exe 29 PID 2924 wrote to memory of 2696 2924 NEAS.e20998ffe08fbe65cc318ececef98ff0.exe 29 PID 2696 wrote to memory of 2644 2696 Logo1_.exe 30 PID 2696 wrote to memory of 2644 2696 Logo1_.exe 30 PID 2696 wrote to memory of 2644 2696 Logo1_.exe 30 PID 2696 wrote to memory of 2644 2696 Logo1_.exe 30 PID 2644 wrote to memory of 1568 2644 net.exe 33 PID 2644 wrote to memory of 1568 2644 net.exe 33 PID 2644 wrote to memory of 1568 2644 net.exe 33 PID 2644 wrote to memory of 1568 2644 net.exe 33 PID 2696 wrote to memory of 1264 2696 Logo1_.exe 7 PID 2696 wrote to memory of 1264 2696 Logo1_.exe 7
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.e20998ffe08fbe65cc318ececef98ff0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e20998ffe08fbe65cc318ececef98ff0.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a869D.bat2⤵
- Deletes itself
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\NEAS.e20998ffe08fbe65cc318ececef98ff0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e20998ffe08fbe65cc318ececef98ff0.exe"3⤵
- Executes dropped EXE
PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.e20998ffe08fbe65cc318ececef98ff0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e20998ffe08fbe65cc318ececef98ff0.exe"3⤵
- Executes dropped EXE
PID:1524
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1568
-
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
560B
MD57b67003ec1c7e5a973e9d5ca4ed4e050
SHA151b1b3a06452144bd6b5fac53134f8bbe854a983
SHA2565c1693561b83af43b071b147ee257bf394c2a32578d88a616cbc78f77a074b6d
SHA512393c833c2449bf7a195c6137a30e9c289763787fdfaa4065894f880ecd6786613c2579bdb89a84128f0386c8bf8a7eddfcd56042cf5b66abd619096c8e59defc
-
Filesize
560B
MD57b67003ec1c7e5a973e9d5ca4ed4e050
SHA151b1b3a06452144bd6b5fac53134f8bbe854a983
SHA2565c1693561b83af43b071b147ee257bf394c2a32578d88a616cbc78f77a074b6d
SHA512393c833c2449bf7a195c6137a30e9c289763787fdfaa4065894f880ecd6786613c2579bdb89a84128f0386c8bf8a7eddfcd56042cf5b66abd619096c8e59defc
-
Filesize
75KB
MD5a7851a05e83f42f741a804320c485083
SHA1b76d2e6eb6d2bf289a5118c908578906851460d0
SHA2563600ff58fdb37f53562e626fd74d6f4d8d39925d711a96f221bb4aca7992926a
SHA512eadbfbee79aa0f34b35e0a9c9d717b3c8ac18729df8e52332b696352a2a41d0da37119ab1cb81a10bb7854b930e6479686f8fa8b5a447d48213e3c1c9304ce7b
-
Filesize
75KB
MD5a7851a05e83f42f741a804320c485083
SHA1b76d2e6eb6d2bf289a5118c908578906851460d0
SHA2563600ff58fdb37f53562e626fd74d6f4d8d39925d711a96f221bb4aca7992926a
SHA512eadbfbee79aa0f34b35e0a9c9d717b3c8ac18729df8e52332b696352a2a41d0da37119ab1cb81a10bb7854b930e6479686f8fa8b5a447d48213e3c1c9304ce7b
-
Filesize
75KB
MD5a7851a05e83f42f741a804320c485083
SHA1b76d2e6eb6d2bf289a5118c908578906851460d0
SHA2563600ff58fdb37f53562e626fd74d6f4d8d39925d711a96f221bb4aca7992926a
SHA512eadbfbee79aa0f34b35e0a9c9d717b3c8ac18729df8e52332b696352a2a41d0da37119ab1cb81a10bb7854b930e6479686f8fa8b5a447d48213e3c1c9304ce7b
-
Filesize
26KB
MD5b029778f3ac823d7c0b7150399fb9da1
SHA1f3f4b3615f75b7ff4992e41e62f7ceac37d06e11
SHA25634ac708d04dc44510292d2642c1fee1d74a0c64977d79c6086c8b38f7ab34d29
SHA512af256d7118bb42bf8216dab9a34078d1970d21d42ccb382208ff4f8a53f66041d11a04e687fa70b0cf4bca542b743c1f57c227aba889232c705925a79c3504a0
-
Filesize
26KB
MD5b029778f3ac823d7c0b7150399fb9da1
SHA1f3f4b3615f75b7ff4992e41e62f7ceac37d06e11
SHA25634ac708d04dc44510292d2642c1fee1d74a0c64977d79c6086c8b38f7ab34d29
SHA512af256d7118bb42bf8216dab9a34078d1970d21d42ccb382208ff4f8a53f66041d11a04e687fa70b0cf4bca542b743c1f57c227aba889232c705925a79c3504a0
-
Filesize
26KB
MD5b029778f3ac823d7c0b7150399fb9da1
SHA1f3f4b3615f75b7ff4992e41e62f7ceac37d06e11
SHA25634ac708d04dc44510292d2642c1fee1d74a0c64977d79c6086c8b38f7ab34d29
SHA512af256d7118bb42bf8216dab9a34078d1970d21d42ccb382208ff4f8a53f66041d11a04e687fa70b0cf4bca542b743c1f57c227aba889232c705925a79c3504a0
-
Filesize
26KB
MD5b029778f3ac823d7c0b7150399fb9da1
SHA1f3f4b3615f75b7ff4992e41e62f7ceac37d06e11
SHA25634ac708d04dc44510292d2642c1fee1d74a0c64977d79c6086c8b38f7ab34d29
SHA512af256d7118bb42bf8216dab9a34078d1970d21d42ccb382208ff4f8a53f66041d11a04e687fa70b0cf4bca542b743c1f57c227aba889232c705925a79c3504a0
-
Filesize
10B
MD5b00c1a89b15effd3d1fb2de4fdc7bee5
SHA10c3a4f06bcd397d1d3a63ab2ca05e64cc7ae554d
SHA2560767fccea7e57d6427b0a9b440f28687f4b835409c5dcdeb337a479009222cd9
SHA512b50a3c1df331ecd7dbbd88c202c7b7b8fe6ece8df96249d88f40138952fb3c523f6f133a2d12daa2fd892643b53e4c19b39bcb16ef810f789c996e00bad03bc0