Analysis
-
max time kernel
153s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2023 08:24
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.fce339391dd4f449342731311e6b6f80.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.fce339391dd4f449342731311e6b6f80.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.fce339391dd4f449342731311e6b6f80.exe
-
Size
206KB
-
MD5
fce339391dd4f449342731311e6b6f80
-
SHA1
89a9f0594b8fd733b482e7082c4d1b88b78b3204
-
SHA256
6824f93ab23a4294dd884992fe1c2e4ca1f8b9ef90aa1a11cd94abdca1758382
-
SHA512
02fdb1429ebccf54eb784d9dee31f118ee858cbf2ef02801b5ad9de312e2c470b111894181e7851a3fc805da9fcf219a0b6ebd7ec273bb08c9997c55dd6e6149
-
SSDEEP
3072:evEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unM9:evEN2U+T6i5LirrllHy4HUcMQY6v
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4396 explorer.exe 528 spoolsv.exe 4228 svchost.exe 2352 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe NEAS.fce339391dd4f449342731311e6b6f80.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3088 NEAS.fce339391dd4f449342731311e6b6f80.exe 3088 NEAS.fce339391dd4f449342731311e6b6f80.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe 4396 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4396 explorer.exe 4228 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3088 NEAS.fce339391dd4f449342731311e6b6f80.exe 3088 NEAS.fce339391dd4f449342731311e6b6f80.exe 4396 explorer.exe 4396 explorer.exe 528 spoolsv.exe 528 spoolsv.exe 4228 svchost.exe 4228 svchost.exe 2352 spoolsv.exe 2352 spoolsv.exe 4396 explorer.exe 4396 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3088 wrote to memory of 4396 3088 NEAS.fce339391dd4f449342731311e6b6f80.exe 87 PID 3088 wrote to memory of 4396 3088 NEAS.fce339391dd4f449342731311e6b6f80.exe 87 PID 3088 wrote to memory of 4396 3088 NEAS.fce339391dd4f449342731311e6b6f80.exe 87 PID 4396 wrote to memory of 528 4396 explorer.exe 88 PID 4396 wrote to memory of 528 4396 explorer.exe 88 PID 4396 wrote to memory of 528 4396 explorer.exe 88 PID 528 wrote to memory of 4228 528 spoolsv.exe 89 PID 528 wrote to memory of 4228 528 spoolsv.exe 89 PID 528 wrote to memory of 4228 528 spoolsv.exe 89 PID 4228 wrote to memory of 2352 4228 svchost.exe 90 PID 4228 wrote to memory of 2352 4228 svchost.exe 90 PID 4228 wrote to memory of 2352 4228 svchost.exe 90 PID 4228 wrote to memory of 4764 4228 svchost.exe 91 PID 4228 wrote to memory of 4764 4228 svchost.exe 91 PID 4228 wrote to memory of 4764 4228 svchost.exe 91 PID 4228 wrote to memory of 3484 4228 svchost.exe 106 PID 4228 wrote to memory of 3484 4228 svchost.exe 106 PID 4228 wrote to memory of 3484 4228 svchost.exe 106 PID 4228 wrote to memory of 4940 4228 svchost.exe 111 PID 4228 wrote to memory of 4940 4228 svchost.exe 111 PID 4228 wrote to memory of 4940 4228 svchost.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.fce339391dd4f449342731311e6b6f80.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.fce339391dd4f449342731311e6b6f80.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3088 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4396 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:528 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4228 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2352
-
-
C:\Windows\SysWOW64\at.exeat 21:57 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4764
-
-
C:\Windows\SysWOW64\at.exeat 07:43 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3484
-
-
C:\Windows\SysWOW64\at.exeat 07:44 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4940
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5127bc411e2a30ffdd6c31e96634f408e
SHA143f7bfa8498e2e418250c7d302f6d7ef4eed0183
SHA256b4d8cf1ffc28bd1512fdf68f17e56904e0abb4c04a3857f9bac59b231e1b39c2
SHA512a6673c884766fe6b5f2ee2a6bb7bbce1857c0e8549d7231d6c0612d34e980a2fc2a1b1e190f6a56f98bcb2ebb19943f6f4480ef9422cdfc7c14782146b90cb04
-
Filesize
206KB
MD5fb4a3b1b0e67b3b4149d90e753e17176
SHA146f25525aaef1f1e57088b3b68934f9b269226e5
SHA2565da5551c84311788b7748da46699e0de80b7167a87726a712a983e0f207c3228
SHA512bebeba1abaf5e408b494547a5b3c0aca10ba3b18d5b8faa883d8e654eaaf78d2cf018d9b445f0aaf94117d0603d8a883a526be61be7fcf9b6f12079810d92500
-
Filesize
206KB
MD5f908e2aab98915eb3b4fcc079b95f2be
SHA10e3a9f897aa65127956bab40786ff1a368fec590
SHA256ea4a263f52699e3a93ba376e9b4d9cd2ac30dffdb4bc4354cf3af834b52fbd01
SHA512b2174784cdbe4d3b24bd49adaa76ceebf1024cb1c1d0e0fcadca82067b82333777ffc951a3e4197a174000104594a25c340ee9b15113d7e46558576b4cf57846
-
Filesize
206KB
MD5f908e2aab98915eb3b4fcc079b95f2be
SHA10e3a9f897aa65127956bab40786ff1a368fec590
SHA256ea4a263f52699e3a93ba376e9b4d9cd2ac30dffdb4bc4354cf3af834b52fbd01
SHA512b2174784cdbe4d3b24bd49adaa76ceebf1024cb1c1d0e0fcadca82067b82333777ffc951a3e4197a174000104594a25c340ee9b15113d7e46558576b4cf57846
-
Filesize
206KB
MD5f908e2aab98915eb3b4fcc079b95f2be
SHA10e3a9f897aa65127956bab40786ff1a368fec590
SHA256ea4a263f52699e3a93ba376e9b4d9cd2ac30dffdb4bc4354cf3af834b52fbd01
SHA512b2174784cdbe4d3b24bd49adaa76ceebf1024cb1c1d0e0fcadca82067b82333777ffc951a3e4197a174000104594a25c340ee9b15113d7e46558576b4cf57846
-
Filesize
206KB
MD50345476b56eab04b0ee80dc070949cd0
SHA1efdcd868350b23dabda9758b860178f0ae81c08a
SHA2566599caaa17bd11bfa8f6859abbd0a18987994f214086a15d21c0b2a3caba816d
SHA51292763f391d4d5b840f89241ce9960c9d9e0026a08243ccb106ecf1a7fe6630da3e0b74f2724c3d5286c343b8646a6dfabce8342e4641c6a10dd0cadbd8c8d208
-
Filesize
206KB
MD5fb4a3b1b0e67b3b4149d90e753e17176
SHA146f25525aaef1f1e57088b3b68934f9b269226e5
SHA2565da5551c84311788b7748da46699e0de80b7167a87726a712a983e0f207c3228
SHA512bebeba1abaf5e408b494547a5b3c0aca10ba3b18d5b8faa883d8e654eaaf78d2cf018d9b445f0aaf94117d0603d8a883a526be61be7fcf9b6f12079810d92500
-
Filesize
206KB
MD5f908e2aab98915eb3b4fcc079b95f2be
SHA10e3a9f897aa65127956bab40786ff1a368fec590
SHA256ea4a263f52699e3a93ba376e9b4d9cd2ac30dffdb4bc4354cf3af834b52fbd01
SHA512b2174784cdbe4d3b24bd49adaa76ceebf1024cb1c1d0e0fcadca82067b82333777ffc951a3e4197a174000104594a25c340ee9b15113d7e46558576b4cf57846
-
Filesize
206KB
MD50345476b56eab04b0ee80dc070949cd0
SHA1efdcd868350b23dabda9758b860178f0ae81c08a
SHA2566599caaa17bd11bfa8f6859abbd0a18987994f214086a15d21c0b2a3caba816d
SHA51292763f391d4d5b840f89241ce9960c9d9e0026a08243ccb106ecf1a7fe6630da3e0b74f2724c3d5286c343b8646a6dfabce8342e4641c6a10dd0cadbd8c8d208