Analysis

  • max time kernel
    151s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2023 10:53

General

  • Target

    NEAS.ae73d5d569ce0096900057dcea037a46_JC.exe

  • Size

    387KB

  • MD5

    ae73d5d569ce0096900057dcea037a46

  • SHA1

    eca059df4afc373ba77bd10e63acd20a5c741777

  • SHA256

    1d2a9b2ae1ca557fcedf03b279f17415123599255e1599037a1814479eccabb7

  • SHA512

    a5396404f82c20f91803435a79f4d29c1791889de1d1af8c91aabaa1f26a980882929ca8d64125f6ab6cf59c88c0b5ddd0c0897343be1fdae44800d99f30eabe

  • SSDEEP

    12288:3Y6mMyF1raIs8XheouovrDDscHAFHHBPcIlY:ryXrmj4PtAFHGIy

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 5 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in System32 directory 7 IoCs
  • Drops file in Windows directory 8 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.ae73d5d569ce0096900057dcea037a46_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.ae73d5d569ce0096900057dcea037a46_JC.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds policy Run key to start application
    • Modifies Installed Components in the registry
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Windows\SysWOW64\fservice.exe
      C:\Windows\system32\fservice.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Windows\services.exe
        C:\Windows\services.exe -XP
        3⤵
        • Modifies WinLogon for persistence
        • Adds policy Run key to start application
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2544
        • C:\Windows\SysWOW64\NET.exe
          NET STOP navapsvc
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2236
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 STOP navapsvc
            5⤵
              PID:1544
          • C:\Windows\SysWOW64\NET.exe
            NET STOP SharedAccess
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3068
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 STOP SharedAccess
              5⤵
                PID:1044

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\fservice.exe

        Filesize

        387KB

        MD5

        ae73d5d569ce0096900057dcea037a46

        SHA1

        eca059df4afc373ba77bd10e63acd20a5c741777

        SHA256

        1d2a9b2ae1ca557fcedf03b279f17415123599255e1599037a1814479eccabb7

        SHA512

        a5396404f82c20f91803435a79f4d29c1791889de1d1af8c91aabaa1f26a980882929ca8d64125f6ab6cf59c88c0b5ddd0c0897343be1fdae44800d99f30eabe

      • C:\Windows\SysWOW64\fservice.exe

        Filesize

        387KB

        MD5

        ae73d5d569ce0096900057dcea037a46

        SHA1

        eca059df4afc373ba77bd10e63acd20a5c741777

        SHA256

        1d2a9b2ae1ca557fcedf03b279f17415123599255e1599037a1814479eccabb7

        SHA512

        a5396404f82c20f91803435a79f4d29c1791889de1d1af8c91aabaa1f26a980882929ca8d64125f6ab6cf59c88c0b5ddd0c0897343be1fdae44800d99f30eabe

      • C:\Windows\SysWOW64\fservice.exe

        Filesize

        387KB

        MD5

        ae73d5d569ce0096900057dcea037a46

        SHA1

        eca059df4afc373ba77bd10e63acd20a5c741777

        SHA256

        1d2a9b2ae1ca557fcedf03b279f17415123599255e1599037a1814479eccabb7

        SHA512

        a5396404f82c20f91803435a79f4d29c1791889de1d1af8c91aabaa1f26a980882929ca8d64125f6ab6cf59c88c0b5ddd0c0897343be1fdae44800d99f30eabe

      • C:\Windows\services.exe

        Filesize

        387KB

        MD5

        ae73d5d569ce0096900057dcea037a46

        SHA1

        eca059df4afc373ba77bd10e63acd20a5c741777

        SHA256

        1d2a9b2ae1ca557fcedf03b279f17415123599255e1599037a1814479eccabb7

        SHA512

        a5396404f82c20f91803435a79f4d29c1791889de1d1af8c91aabaa1f26a980882929ca8d64125f6ab6cf59c88c0b5ddd0c0897343be1fdae44800d99f30eabe

      • C:\Windows\services.exe

        Filesize

        387KB

        MD5

        ae73d5d569ce0096900057dcea037a46

        SHA1

        eca059df4afc373ba77bd10e63acd20a5c741777

        SHA256

        1d2a9b2ae1ca557fcedf03b279f17415123599255e1599037a1814479eccabb7

        SHA512

        a5396404f82c20f91803435a79f4d29c1791889de1d1af8c91aabaa1f26a980882929ca8d64125f6ab6cf59c88c0b5ddd0c0897343be1fdae44800d99f30eabe

      • C:\Windows\system\sservice.exe

        Filesize

        387KB

        MD5

        ae73d5d569ce0096900057dcea037a46

        SHA1

        eca059df4afc373ba77bd10e63acd20a5c741777

        SHA256

        1d2a9b2ae1ca557fcedf03b279f17415123599255e1599037a1814479eccabb7

        SHA512

        a5396404f82c20f91803435a79f4d29c1791889de1d1af8c91aabaa1f26a980882929ca8d64125f6ab6cf59c88c0b5ddd0c0897343be1fdae44800d99f30eabe

      • \Windows\SysWOW64\fservice.exe

        Filesize

        387KB

        MD5

        ae73d5d569ce0096900057dcea037a46

        SHA1

        eca059df4afc373ba77bd10e63acd20a5c741777

        SHA256

        1d2a9b2ae1ca557fcedf03b279f17415123599255e1599037a1814479eccabb7

        SHA512

        a5396404f82c20f91803435a79f4d29c1791889de1d1af8c91aabaa1f26a980882929ca8d64125f6ab6cf59c88c0b5ddd0c0897343be1fdae44800d99f30eabe

      • \Windows\SysWOW64\fservice.exe

        Filesize

        387KB

        MD5

        ae73d5d569ce0096900057dcea037a46

        SHA1

        eca059df4afc373ba77bd10e63acd20a5c741777

        SHA256

        1d2a9b2ae1ca557fcedf03b279f17415123599255e1599037a1814479eccabb7

        SHA512

        a5396404f82c20f91803435a79f4d29c1791889de1d1af8c91aabaa1f26a980882929ca8d64125f6ab6cf59c88c0b5ddd0c0897343be1fdae44800d99f30eabe

      • \Windows\SysWOW64\wininv.dll

        Filesize

        24KB

        MD5

        f44e9190900ae1ff43d951dc12691e6c

        SHA1

        b17cb75f21486fdf0fff99c0313a7156a62653b8

        SHA256

        1feb2aea58b433b163612d51f454862d9e2921624be878cb26d8609e2c6d1cc0

        SHA512

        8d3c0fe7ccd4cae8bafedf08b92c6fd344a008063c9511def1c5399583336a2034543db15e75fdc42c16e70d14055263aac06240b457b57bd859520b4f3ba714

      • \Windows\SysWOW64\winkey.dll

        Filesize

        24KB

        MD5

        6ebe4162566888dc0050afc8bacde715

        SHA1

        e592f0e306eec69b4114228d15cdf3cb57b253af

        SHA256

        ce7cbb099826c1d946c4bcb97cd2f43a5d34a8e16fd8b181be993702b2dd3452

        SHA512

        74f33f9d48b1622d0c8ddedb5bc9d9f30c37197b06f4bc0acccff0e272a1ea08d657eee3f0f532a2461d936e40af245594826e60e3874c09bbb835efeedcae65

      • memory/2016-31-0x0000000000400000-0x00000000005EB000-memory.dmp

        Filesize

        1.9MB

      • memory/2016-33-0x0000000000240000-0x0000000000241000-memory.dmp

        Filesize

        4KB

      • memory/2016-37-0x0000000000400000-0x00000000005EB000-memory.dmp

        Filesize

        1.9MB

      • memory/2016-15-0x0000000000400000-0x00000000005EB000-memory.dmp

        Filesize

        1.9MB

      • memory/2016-21-0x0000000000240000-0x0000000000241000-memory.dmp

        Filesize

        4KB

      • memory/2544-38-0x0000000000400000-0x00000000005EB000-memory.dmp

        Filesize

        1.9MB

      • memory/2544-49-0x0000000075650000-0x0000000075659000-memory.dmp

        Filesize

        36KB

      • memory/2544-42-0x0000000000240000-0x0000000000241000-memory.dmp

        Filesize

        4KB

      • memory/2544-54-0x0000000000400000-0x00000000005EB000-memory.dmp

        Filesize

        1.9MB

      • memory/2544-53-0x0000000000400000-0x00000000005EB000-memory.dmp

        Filesize

        1.9MB

      • memory/2544-52-0x0000000000240000-0x0000000000241000-memory.dmp

        Filesize

        4KB

      • memory/2544-48-0x0000000075500000-0x000000007553B000-memory.dmp

        Filesize

        236KB

      • memory/2544-46-0x0000000076280000-0x00000000762AA000-memory.dmp

        Filesize

        168KB

      • memory/2544-47-0x00000000777C0000-0x000000007788C000-memory.dmp

        Filesize

        816KB

      • memory/2544-50-0x0000000076690000-0x0000000076780000-memory.dmp

        Filesize

        960KB

      • memory/2544-32-0x0000000000400000-0x00000000005EB000-memory.dmp

        Filesize

        1.9MB

      • memory/2808-13-0x0000000000400000-0x00000000005EB000-memory.dmp

        Filesize

        1.9MB

      • memory/2808-20-0x0000000000400000-0x00000000005EB000-memory.dmp

        Filesize

        1.9MB

      • memory/2808-0-0x0000000000240000-0x0000000000241000-memory.dmp

        Filesize

        4KB

      • memory/2808-14-0x0000000000240000-0x0000000000241000-memory.dmp

        Filesize

        4KB