Analysis
-
max time kernel
158s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.60e902ea036ea4101f7bf7c6a8296210.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.60e902ea036ea4101f7bf7c6a8296210.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.60e902ea036ea4101f7bf7c6a8296210.exe
-
Size
127KB
-
MD5
60e902ea036ea4101f7bf7c6a8296210
-
SHA1
68c6f5575d01abb4d9186c1335e1b0290376f402
-
SHA256
07e1b6a1a11928cfa3fab6f16c1ecf28556517930afd760e745aee6facb22da0
-
SHA512
5680c90835c235558ecc453c46dd1858cfe7e402037cfdc0acce8912ff4501652ceebb8cc0f95020fa7b09572483cafb1192cfbc0a121e958df8456f0983bd37
-
SSDEEP
1536:l6u6YB56XJ6owvzbNfURp4VntUhtH7Vi4BhRMq+xN:l6uB28owvlrVnihVVi4HaN
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\29374 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\ccwyyh.cmd" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2080 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe -
Loads dropped DLL 1 IoCs
pid Process 1900 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1900 set thread context of 2080 1900 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe 27 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\ccwyyh.cmd svchost.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:< NEAS.60e902ea036ea4101f7bf7c6a8296210.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2080 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe 2080 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2080 1900 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe 27 PID 1900 wrote to memory of 2080 1900 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe 27 PID 1900 wrote to memory of 2080 1900 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe 27 PID 1900 wrote to memory of 2080 1900 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe 27 PID 1900 wrote to memory of 2080 1900 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe 27 PID 1900 wrote to memory of 2080 1900 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe 27 PID 1900 wrote to memory of 2080 1900 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe 27 PID 2080 wrote to memory of 1064 2080 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe 28 PID 2080 wrote to memory of 1064 2080 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe 28 PID 2080 wrote to memory of 1064 2080 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe 28 PID 2080 wrote to memory of 1064 2080 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.60e902ea036ea4101f7bf7c6a8296210.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.60e902ea036ea4101f7bf7c6a8296210.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\NEAS.60e902ea036ea4101f7bf7c6a8296210.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.60e902ea036ea4101f7bf7c6a8296210.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
PID:1064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD560e902ea036ea4101f7bf7c6a8296210
SHA168c6f5575d01abb4d9186c1335e1b0290376f402
SHA25607e1b6a1a11928cfa3fab6f16c1ecf28556517930afd760e745aee6facb22da0
SHA5125680c90835c235558ecc453c46dd1858cfe7e402037cfdc0acce8912ff4501652ceebb8cc0f95020fa7b09572483cafb1192cfbc0a121e958df8456f0983bd37
-
Filesize
127KB
MD560e902ea036ea4101f7bf7c6a8296210
SHA168c6f5575d01abb4d9186c1335e1b0290376f402
SHA25607e1b6a1a11928cfa3fab6f16c1ecf28556517930afd760e745aee6facb22da0
SHA5125680c90835c235558ecc453c46dd1858cfe7e402037cfdc0acce8912ff4501652ceebb8cc0f95020fa7b09572483cafb1192cfbc0a121e958df8456f0983bd37