Analysis
-
max time kernel
154s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14-10-2023 17:49
Behavioral task
behavioral1
Sample
NEAS.296d390d5729be1bf51c361c1968e570.exe
Resource
win7-20230831-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.296d390d5729be1bf51c361c1968e570.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
10 signatures
150 seconds
General
-
Target
NEAS.296d390d5729be1bf51c361c1968e570.exe
-
Size
2.4MB
-
MD5
296d390d5729be1bf51c361c1968e570
-
SHA1
ba71371c700c51d3cb19fa9f398120b6870ac818
-
SHA256
b20b0a6814a33cf37e3be53c99c1bfb40092545ef6cabf6b75cfd13e43aa172e
-
SHA512
7e7fc6ea660fbc8608888cf91f2b9e0d5adf1bb3faf06b092f2d48475d3dcadad94d8e5c01e389e8c55b1f426698d359059fe0a02778574e74059c1397c6d4c6
-
SSDEEP
49152:ZE13D8c4GG/jfKCfGgY1zpjG6xiYfFzKeAxk:8Ho/OKG91zpC6xiYfFWe7
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
resource yara_rule behavioral1/memory/2468-0-0x00000000002E0000-0x000000000048D000-memory.dmp upx behavioral1/memory/2468-2-0x00000000002E0000-0x000000000048D000-memory.dmp upx -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2432 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.296d390d5729be1bf51c361c1968e570.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.296d390d5729be1bf51c361c1968e570.exe"1⤵PID:2468
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2432