Analysis
-
max time kernel
152s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 17:58
Behavioral task
behavioral1
Sample
NEAS.6d7df5d3e5959e6e6a8035329f86b490.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.6d7df5d3e5959e6e6a8035329f86b490.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.6d7df5d3e5959e6e6a8035329f86b490.exe
-
Size
3.8MB
-
MD5
6d7df5d3e5959e6e6a8035329f86b490
-
SHA1
d790b8570d1eaca893bea287a0b99c33884687e9
-
SHA256
b7cb1446ed8bd8fb97d466e3227a9f932bf6c7b5372e817fd3eb8a938fdda4f7
-
SHA512
39870216364e987120a935b64b06ad129b260d740cc02c38025f319081e00cd60a280886b7a4abb1dd96404e2177e04d50980b76d6b7b50c02faa3132d917a84
-
SSDEEP
98304:ji4hTLOMtHDMlANqnfVGPyhcMYg4lSiSLCQrdGLcjFjj/eWKS5h7EleIljztU/ql:ji4hTLOMtHDMlANqnfVGPyhcMYg4lSiz
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate mcsft.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation NEAS.6d7df5d3e5959e6e6a8035329f86b490.exe -
Executes dropped EXE 2 IoCs
pid Process 2864 mcsft.exe 1708 mcsft.exe -
resource yara_rule behavioral2/memory/3656-0-0x0000000000400000-0x00000000007C9000-memory.dmp upx behavioral2/files/0x000b000000023106-16.dat upx behavioral2/files/0x000c000000023108-26.dat upx behavioral2/files/0x000c000000023108-27.dat upx behavioral2/memory/3656-29-0x0000000000400000-0x00000000007C9000-memory.dmp upx behavioral2/memory/1708-31-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/files/0x000c000000023108-32.dat upx behavioral2/memory/1708-34-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/2864-35-0x0000000000400000-0x00000000007C9000-memory.dmp upx behavioral2/memory/1708-36-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1708-38-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1708-39-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1708-40-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1708-42-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1708-44-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1708-43-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1708-45-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1708-46-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1708-47-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1708-48-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1708-49-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1708-50-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1708-51-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1708-52-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1708-53-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1708-54-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1708-55-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1708-56-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1708-57-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1708-58-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1708-59-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1708-60-0x0000000000400000-0x00000000004B5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mcrosoft = "C:\\Users\\Admin\\AppData\\Roaming\\mcsft.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2864 set thread context of 1708 2864 mcsft.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier mcsft.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mcsft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mcsft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier mcsft.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier mcsft.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1708 mcsft.exe Token: SeSecurityPrivilege 1708 mcsft.exe Token: SeTakeOwnershipPrivilege 1708 mcsft.exe Token: SeLoadDriverPrivilege 1708 mcsft.exe Token: SeSystemProfilePrivilege 1708 mcsft.exe Token: SeSystemtimePrivilege 1708 mcsft.exe Token: SeProfSingleProcessPrivilege 1708 mcsft.exe Token: SeIncBasePriorityPrivilege 1708 mcsft.exe Token: SeCreatePagefilePrivilege 1708 mcsft.exe Token: SeBackupPrivilege 1708 mcsft.exe Token: SeRestorePrivilege 1708 mcsft.exe Token: SeShutdownPrivilege 1708 mcsft.exe Token: SeDebugPrivilege 1708 mcsft.exe Token: SeSystemEnvironmentPrivilege 1708 mcsft.exe Token: SeChangeNotifyPrivilege 1708 mcsft.exe Token: SeRemoteShutdownPrivilege 1708 mcsft.exe Token: SeUndockPrivilege 1708 mcsft.exe Token: SeManageVolumePrivilege 1708 mcsft.exe Token: SeImpersonatePrivilege 1708 mcsft.exe Token: SeCreateGlobalPrivilege 1708 mcsft.exe Token: 33 1708 mcsft.exe Token: 34 1708 mcsft.exe Token: 35 1708 mcsft.exe Token: 36 1708 mcsft.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3656 NEAS.6d7df5d3e5959e6e6a8035329f86b490.exe 2864 mcsft.exe 1708 mcsft.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3656 wrote to memory of 3964 3656 NEAS.6d7df5d3e5959e6e6a8035329f86b490.exe 86 PID 3656 wrote to memory of 3964 3656 NEAS.6d7df5d3e5959e6e6a8035329f86b490.exe 86 PID 3656 wrote to memory of 3964 3656 NEAS.6d7df5d3e5959e6e6a8035329f86b490.exe 86 PID 3964 wrote to memory of 4484 3964 cmd.exe 89 PID 3964 wrote to memory of 4484 3964 cmd.exe 89 PID 3964 wrote to memory of 4484 3964 cmd.exe 89 PID 3656 wrote to memory of 2864 3656 NEAS.6d7df5d3e5959e6e6a8035329f86b490.exe 90 PID 3656 wrote to memory of 2864 3656 NEAS.6d7df5d3e5959e6e6a8035329f86b490.exe 90 PID 3656 wrote to memory of 2864 3656 NEAS.6d7df5d3e5959e6e6a8035329f86b490.exe 90 PID 2864 wrote to memory of 1708 2864 mcsft.exe 91 PID 2864 wrote to memory of 1708 2864 mcsft.exe 91 PID 2864 wrote to memory of 1708 2864 mcsft.exe 91 PID 2864 wrote to memory of 1708 2864 mcsft.exe 91 PID 2864 wrote to memory of 1708 2864 mcsft.exe 91 PID 2864 wrote to memory of 1708 2864 mcsft.exe 91 PID 2864 wrote to memory of 1708 2864 mcsft.exe 91 PID 2864 wrote to memory of 1708 2864 mcsft.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6d7df5d3e5959e6e6a8035329f86b490.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6d7df5d3e5959e6e6a8035329f86b490.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kdork.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Mcrosoft" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\mcsft.exe" /f3⤵
- Adds Run key to start application
PID:4484
-
-
-
C:\Users\Admin\AppData\Roaming\mcsft.exe"C:\Users\Admin\AppData\Roaming\mcsft.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Roaming\mcsft.exeC:\Users\Admin\AppData\Roaming\mcsft.exe3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135B
MD5a5feca573884d76f559b996d45e8ad9a
SHA10e81a993f3af4e31d60653dc2513186f0495f1c8
SHA256c98e20d46d6465febb5d29cfab51241521ea5d6cd621f5e18b9b7d6fbfac3f0f
SHA512a9239648b5f15eac4d4151b6e1bdc81065eeaeb101404c2a0126f03bc87f1e6a57206bfa07a44379e9d3bba889e4497a9991ff41fb109099b01512df3dc3cbda
-
Filesize
135B
MD5a5feca573884d76f559b996d45e8ad9a
SHA10e81a993f3af4e31d60653dc2513186f0495f1c8
SHA256c98e20d46d6465febb5d29cfab51241521ea5d6cd621f5e18b9b7d6fbfac3f0f
SHA512a9239648b5f15eac4d4151b6e1bdc81065eeaeb101404c2a0126f03bc87f1e6a57206bfa07a44379e9d3bba889e4497a9991ff41fb109099b01512df3dc3cbda
-
Filesize
3.8MB
MD5aebd104effd5f053a7843939c1a3ffbe
SHA15158adc5fa268d23aab2959251438de1e7bf7b8d
SHA256d1b65c588066e55283e522a235794cbea4c5d5daa061d915d59ee5666d69f447
SHA512621b2a7f0d6752b33285ec536492c2fd0315a6a49d29cc588379a2c36dd1457fef56e8c433fbd116f6dabfb82a3137148321a28f50c062d4301f5e1b72d7e116
-
Filesize
3.8MB
MD5aebd104effd5f053a7843939c1a3ffbe
SHA15158adc5fa268d23aab2959251438de1e7bf7b8d
SHA256d1b65c588066e55283e522a235794cbea4c5d5daa061d915d59ee5666d69f447
SHA512621b2a7f0d6752b33285ec536492c2fd0315a6a49d29cc588379a2c36dd1457fef56e8c433fbd116f6dabfb82a3137148321a28f50c062d4301f5e1b72d7e116
-
Filesize
3.8MB
MD5aebd104effd5f053a7843939c1a3ffbe
SHA15158adc5fa268d23aab2959251438de1e7bf7b8d
SHA256d1b65c588066e55283e522a235794cbea4c5d5daa061d915d59ee5666d69f447
SHA512621b2a7f0d6752b33285ec536492c2fd0315a6a49d29cc588379a2c36dd1457fef56e8c433fbd116f6dabfb82a3137148321a28f50c062d4301f5e1b72d7e116
-
Filesize
3.8MB
MD5aebd104effd5f053a7843939c1a3ffbe
SHA15158adc5fa268d23aab2959251438de1e7bf7b8d
SHA256d1b65c588066e55283e522a235794cbea4c5d5daa061d915d59ee5666d69f447
SHA512621b2a7f0d6752b33285ec536492c2fd0315a6a49d29cc588379a2c36dd1457fef56e8c433fbd116f6dabfb82a3137148321a28f50c062d4301f5e1b72d7e116