Analysis
-
max time kernel
149s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.60e902ea036ea4101f7bf7c6a8296210.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.60e902ea036ea4101f7bf7c6a8296210.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.60e902ea036ea4101f7bf7c6a8296210.exe
-
Size
127KB
-
MD5
60e902ea036ea4101f7bf7c6a8296210
-
SHA1
68c6f5575d01abb4d9186c1335e1b0290376f402
-
SHA256
07e1b6a1a11928cfa3fab6f16c1ecf28556517930afd760e745aee6facb22da0
-
SHA512
5680c90835c235558ecc453c46dd1858cfe7e402037cfdc0acce8912ff4501652ceebb8cc0f95020fa7b09572483cafb1192cfbc0a121e958df8456f0983bd37
-
SSDEEP
1536:l6u6YB56XJ6owvzbNfURp4VntUhtH7Vi4BhRMq+xN:l6uB28owvlrVnihVVi4HaN
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\42389 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\cccltfoic.exe" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 3620 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4284 set thread context of 3620 4284 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe 87 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\cccltfoic.exe svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3620 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe 3620 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4284 wrote to memory of 3620 4284 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe 87 PID 4284 wrote to memory of 3620 4284 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe 87 PID 4284 wrote to memory of 3620 4284 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe 87 PID 4284 wrote to memory of 3620 4284 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe 87 PID 4284 wrote to memory of 3620 4284 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe 87 PID 4284 wrote to memory of 3620 4284 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe 87 PID 3620 wrote to memory of 2800 3620 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe 89 PID 3620 wrote to memory of 2800 3620 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe 89 PID 3620 wrote to memory of 2800 3620 NEAS.60e902ea036ea4101f7bf7c6a8296210.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.60e902ea036ea4101f7bf7c6a8296210.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.60e902ea036ea4101f7bf7c6a8296210.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\NEAS.60e902ea036ea4101f7bf7c6a8296210.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.60e902ea036ea4101f7bf7c6a8296210.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
PID:2800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD560e902ea036ea4101f7bf7c6a8296210
SHA168c6f5575d01abb4d9186c1335e1b0290376f402
SHA25607e1b6a1a11928cfa3fab6f16c1ecf28556517930afd760e745aee6facb22da0
SHA5125680c90835c235558ecc453c46dd1858cfe7e402037cfdc0acce8912ff4501652ceebb8cc0f95020fa7b09572483cafb1192cfbc0a121e958df8456f0983bd37