Analysis
-
max time kernel
147s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2023 17:57
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.6addf06d3376886553adcd3a084ed910.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.6addf06d3376886553adcd3a084ed910.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.6addf06d3376886553adcd3a084ed910.exe
-
Size
317KB
-
MD5
6addf06d3376886553adcd3a084ed910
-
SHA1
9daf15b01e1f01609963472e4e70b93a66c7b0d3
-
SHA256
79d44037a239950ca0b2bb8e58611b32233039cdb01369e0a1f81d12df69d7a3
-
SHA512
f4588fb888361ce3dff2ad928ae501dee3eef83d9c0fdbba7e389d4d20cbe1b1e968de67fdc2504339eb8c9c59aa57433358f4aa108bdd7b4517a007fc3944eb
-
SSDEEP
768:5BBdFYDgao5/AUrLEEzayTpBJfxBDlxkFNXK8D1Foji:5pcC/eAayJ3Rx8T
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3120 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command NEAS.6addf06d3376886553adcd3a084ed910.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" NEAS.6addf06d3376886553adcd3a084ed910.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" NEAS.6addf06d3376886553adcd3a084ed910.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\¢«.exe NEAS.6addf06d3376886553adcd3a084ed910.exe File created C:\Windows\SysWOW64\notepad¢¬.exe NEAS.6addf06d3376886553adcd3a084ed910.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\system\rundll32.exe NEAS.6addf06d3376886553adcd3a084ed910.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3968 3120 WerFault.exe 88 -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" NEAS.6addf06d3376886553adcd3a084ed910.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command NEAS.6addf06d3376886553adcd3a084ed910.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" NEAS.6addf06d3376886553adcd3a084ed910.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" NEAS.6addf06d3376886553adcd3a084ed910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1697346890" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv NEAS.6addf06d3376886553adcd3a084ed910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1697346890" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "505" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command NEAS.6addf06d3376886553adcd3a084ed910.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" NEAS.6addf06d3376886553adcd3a084ed910.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 3120 rundll32.exe 3120 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4776 wrote to memory of 3120 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 88 PID 4776 wrote to memory of 3120 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 88 PID 4776 wrote to memory of 3120 4776 NEAS.6addf06d3376886553adcd3a084ed910.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6addf06d3376886553adcd3a084ed910.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6addf06d3376886553adcd3a084ed910.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3120 -s 6083⤵
- Program crash
PID:3968
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3120 -ip 31201⤵PID:3004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
346KB
MD53c2d841fef51a016c4d7fbbb16c30589
SHA147f198f6e03771cdc8861fa811a7ed70d3350a19
SHA256145ecbf067c9cd026d054d12e199c4982a87bc0265b4fbf8f044e17ef75e4fa7
SHA5124de72aab222c9d5ad5f2958d7e667d4bd790ce66139d59e2d334793576b2d2c169484dd813f7dc77d47510324b5b5cf935fd8a1b51beddc3f06752fd098f037f
-
Filesize
346KB
MD53c2d841fef51a016c4d7fbbb16c30589
SHA147f198f6e03771cdc8861fa811a7ed70d3350a19
SHA256145ecbf067c9cd026d054d12e199c4982a87bc0265b4fbf8f044e17ef75e4fa7
SHA5124de72aab222c9d5ad5f2958d7e667d4bd790ce66139d59e2d334793576b2d2c169484dd813f7dc77d47510324b5b5cf935fd8a1b51beddc3f06752fd098f037f