Analysis

  • max time kernel
    153s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-10-2023 08:24

General

  • Target

    NEAS.fce339391dd4f449342731311e6b6f80.exe

  • Size

    206KB

  • MD5

    fce339391dd4f449342731311e6b6f80

  • SHA1

    89a9f0594b8fd733b482e7082c4d1b88b78b3204

  • SHA256

    6824f93ab23a4294dd884992fe1c2e4ca1f8b9ef90aa1a11cd94abdca1758382

  • SHA512

    02fdb1429ebccf54eb784d9dee31f118ee858cbf2ef02801b5ad9de312e2c470b111894181e7851a3fc805da9fcf219a0b6ebd7ec273bb08c9997c55dd6e6149

  • SSDEEP

    3072:evEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unM9:evEN2U+T6i5LirrllHy4HUcMQY6v

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.fce339391dd4f449342731311e6b6f80.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.fce339391dd4f449342731311e6b6f80.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3088
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4396
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:528
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4228
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2352
          • C:\Windows\SysWOW64\at.exe
            at 21:57 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:4764
            • C:\Windows\SysWOW64\at.exe
              at 07:43 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:3484
              • C:\Windows\SysWOW64\at.exe
                at 07:44 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:4940

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          206KB

          MD5

          127bc411e2a30ffdd6c31e96634f408e

          SHA1

          43f7bfa8498e2e418250c7d302f6d7ef4eed0183

          SHA256

          b4d8cf1ffc28bd1512fdf68f17e56904e0abb4c04a3857f9bac59b231e1b39c2

          SHA512

          a6673c884766fe6b5f2ee2a6bb7bbce1857c0e8549d7231d6c0612d34e980a2fc2a1b1e190f6a56f98bcb2ebb19943f6f4480ef9422cdfc7c14782146b90cb04

        • C:\Windows\System\explorer.exe

          Filesize

          206KB

          MD5

          fb4a3b1b0e67b3b4149d90e753e17176

          SHA1

          46f25525aaef1f1e57088b3b68934f9b269226e5

          SHA256

          5da5551c84311788b7748da46699e0de80b7167a87726a712a983e0f207c3228

          SHA512

          bebeba1abaf5e408b494547a5b3c0aca10ba3b18d5b8faa883d8e654eaaf78d2cf018d9b445f0aaf94117d0603d8a883a526be61be7fcf9b6f12079810d92500

        • C:\Windows\System\spoolsv.exe

          Filesize

          206KB

          MD5

          f908e2aab98915eb3b4fcc079b95f2be

          SHA1

          0e3a9f897aa65127956bab40786ff1a368fec590

          SHA256

          ea4a263f52699e3a93ba376e9b4d9cd2ac30dffdb4bc4354cf3af834b52fbd01

          SHA512

          b2174784cdbe4d3b24bd49adaa76ceebf1024cb1c1d0e0fcadca82067b82333777ffc951a3e4197a174000104594a25c340ee9b15113d7e46558576b4cf57846

        • C:\Windows\System\spoolsv.exe

          Filesize

          206KB

          MD5

          f908e2aab98915eb3b4fcc079b95f2be

          SHA1

          0e3a9f897aa65127956bab40786ff1a368fec590

          SHA256

          ea4a263f52699e3a93ba376e9b4d9cd2ac30dffdb4bc4354cf3af834b52fbd01

          SHA512

          b2174784cdbe4d3b24bd49adaa76ceebf1024cb1c1d0e0fcadca82067b82333777ffc951a3e4197a174000104594a25c340ee9b15113d7e46558576b4cf57846

        • C:\Windows\System\spoolsv.exe

          Filesize

          206KB

          MD5

          f908e2aab98915eb3b4fcc079b95f2be

          SHA1

          0e3a9f897aa65127956bab40786ff1a368fec590

          SHA256

          ea4a263f52699e3a93ba376e9b4d9cd2ac30dffdb4bc4354cf3af834b52fbd01

          SHA512

          b2174784cdbe4d3b24bd49adaa76ceebf1024cb1c1d0e0fcadca82067b82333777ffc951a3e4197a174000104594a25c340ee9b15113d7e46558576b4cf57846

        • C:\Windows\System\svchost.exe

          Filesize

          206KB

          MD5

          0345476b56eab04b0ee80dc070949cd0

          SHA1

          efdcd868350b23dabda9758b860178f0ae81c08a

          SHA256

          6599caaa17bd11bfa8f6859abbd0a18987994f214086a15d21c0b2a3caba816d

          SHA512

          92763f391d4d5b840f89241ce9960c9d9e0026a08243ccb106ecf1a7fe6630da3e0b74f2724c3d5286c343b8646a6dfabce8342e4641c6a10dd0cadbd8c8d208

        • \??\c:\windows\system\explorer.exe

          Filesize

          206KB

          MD5

          fb4a3b1b0e67b3b4149d90e753e17176

          SHA1

          46f25525aaef1f1e57088b3b68934f9b269226e5

          SHA256

          5da5551c84311788b7748da46699e0de80b7167a87726a712a983e0f207c3228

          SHA512

          bebeba1abaf5e408b494547a5b3c0aca10ba3b18d5b8faa883d8e654eaaf78d2cf018d9b445f0aaf94117d0603d8a883a526be61be7fcf9b6f12079810d92500

        • \??\c:\windows\system\spoolsv.exe

          Filesize

          206KB

          MD5

          f908e2aab98915eb3b4fcc079b95f2be

          SHA1

          0e3a9f897aa65127956bab40786ff1a368fec590

          SHA256

          ea4a263f52699e3a93ba376e9b4d9cd2ac30dffdb4bc4354cf3af834b52fbd01

          SHA512

          b2174784cdbe4d3b24bd49adaa76ceebf1024cb1c1d0e0fcadca82067b82333777ffc951a3e4197a174000104594a25c340ee9b15113d7e46558576b4cf57846

        • \??\c:\windows\system\svchost.exe

          Filesize

          206KB

          MD5

          0345476b56eab04b0ee80dc070949cd0

          SHA1

          efdcd868350b23dabda9758b860178f0ae81c08a

          SHA256

          6599caaa17bd11bfa8f6859abbd0a18987994f214086a15d21c0b2a3caba816d

          SHA512

          92763f391d4d5b840f89241ce9960c9d9e0026a08243ccb106ecf1a7fe6630da3e0b74f2724c3d5286c343b8646a6dfabce8342e4641c6a10dd0cadbd8c8d208

        • memory/528-35-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/2352-32-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/3088-0-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/3088-36-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/4228-39-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/4396-38-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB