Analysis
-
max time kernel
117s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.728dba84d073a71096a7f48ea0aa8f60.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.728dba84d073a71096a7f48ea0aa8f60.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.728dba84d073a71096a7f48ea0aa8f60.exe
-
Size
1.2MB
-
MD5
728dba84d073a71096a7f48ea0aa8f60
-
SHA1
9046bb84c17f266fbf102e6c8ef6ab134f02f623
-
SHA256
5cc0201f06d7d62fe3330742ede25fe8da867052679465ad80f17e7151595fd9
-
SHA512
5d233ad15a44c15302df896f0f54c6247811b90ec35a4594969bd66ccdb154b753dcbd73e2c8527f2718a4d02756e9cbacd12061dfbbc888e02ad12379df39da
-
SSDEEP
24576:0yTVwnrIo9oncTmgPjVz7Gj3i+vzhuPzx5JAquzXvex5t+oeWR5HQZwu4:DTanMKonczJGL9vzhuPV5JJEmTMolSw
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 2052 oY4NI20.exe 2744 nY4Nx95.exe 2604 nG4cb30.exe 2312 1kU47Be5.exe -
Loads dropped DLL 12 IoCs
pid Process 2060 NEAS.728dba84d073a71096a7f48ea0aa8f60.exe 2052 oY4NI20.exe 2052 oY4NI20.exe 2744 nY4Nx95.exe 2744 nY4Nx95.exe 2604 nG4cb30.exe 2604 nG4cb30.exe 2312 1kU47Be5.exe 2632 WerFault.exe 2632 WerFault.exe 2632 WerFault.exe 2632 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" oY4NI20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" nY4Nx95.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" nG4cb30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.728dba84d073a71096a7f48ea0aa8f60.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2312 set thread context of 2528 2312 1kU47Be5.exe 34 -
Program crash 1 IoCs
pid pid_target Process procid_target 2632 2312 WerFault.exe 33 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2528 AppLaunch.exe 2528 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2528 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2052 2060 NEAS.728dba84d073a71096a7f48ea0aa8f60.exe 30 PID 2060 wrote to memory of 2052 2060 NEAS.728dba84d073a71096a7f48ea0aa8f60.exe 30 PID 2060 wrote to memory of 2052 2060 NEAS.728dba84d073a71096a7f48ea0aa8f60.exe 30 PID 2060 wrote to memory of 2052 2060 NEAS.728dba84d073a71096a7f48ea0aa8f60.exe 30 PID 2060 wrote to memory of 2052 2060 NEAS.728dba84d073a71096a7f48ea0aa8f60.exe 30 PID 2060 wrote to memory of 2052 2060 NEAS.728dba84d073a71096a7f48ea0aa8f60.exe 30 PID 2060 wrote to memory of 2052 2060 NEAS.728dba84d073a71096a7f48ea0aa8f60.exe 30 PID 2052 wrote to memory of 2744 2052 oY4NI20.exe 31 PID 2052 wrote to memory of 2744 2052 oY4NI20.exe 31 PID 2052 wrote to memory of 2744 2052 oY4NI20.exe 31 PID 2052 wrote to memory of 2744 2052 oY4NI20.exe 31 PID 2052 wrote to memory of 2744 2052 oY4NI20.exe 31 PID 2052 wrote to memory of 2744 2052 oY4NI20.exe 31 PID 2052 wrote to memory of 2744 2052 oY4NI20.exe 31 PID 2744 wrote to memory of 2604 2744 nY4Nx95.exe 32 PID 2744 wrote to memory of 2604 2744 nY4Nx95.exe 32 PID 2744 wrote to memory of 2604 2744 nY4Nx95.exe 32 PID 2744 wrote to memory of 2604 2744 nY4Nx95.exe 32 PID 2744 wrote to memory of 2604 2744 nY4Nx95.exe 32 PID 2744 wrote to memory of 2604 2744 nY4Nx95.exe 32 PID 2744 wrote to memory of 2604 2744 nY4Nx95.exe 32 PID 2604 wrote to memory of 2312 2604 nG4cb30.exe 33 PID 2604 wrote to memory of 2312 2604 nG4cb30.exe 33 PID 2604 wrote to memory of 2312 2604 nG4cb30.exe 33 PID 2604 wrote to memory of 2312 2604 nG4cb30.exe 33 PID 2604 wrote to memory of 2312 2604 nG4cb30.exe 33 PID 2604 wrote to memory of 2312 2604 nG4cb30.exe 33 PID 2604 wrote to memory of 2312 2604 nG4cb30.exe 33 PID 2312 wrote to memory of 2528 2312 1kU47Be5.exe 34 PID 2312 wrote to memory of 2528 2312 1kU47Be5.exe 34 PID 2312 wrote to memory of 2528 2312 1kU47Be5.exe 34 PID 2312 wrote to memory of 2528 2312 1kU47Be5.exe 34 PID 2312 wrote to memory of 2528 2312 1kU47Be5.exe 34 PID 2312 wrote to memory of 2528 2312 1kU47Be5.exe 34 PID 2312 wrote to memory of 2528 2312 1kU47Be5.exe 34 PID 2312 wrote to memory of 2528 2312 1kU47Be5.exe 34 PID 2312 wrote to memory of 2528 2312 1kU47Be5.exe 34 PID 2312 wrote to memory of 2528 2312 1kU47Be5.exe 34 PID 2312 wrote to memory of 2528 2312 1kU47Be5.exe 34 PID 2312 wrote to memory of 2528 2312 1kU47Be5.exe 34 PID 2312 wrote to memory of 2632 2312 1kU47Be5.exe 35 PID 2312 wrote to memory of 2632 2312 1kU47Be5.exe 35 PID 2312 wrote to memory of 2632 2312 1kU47Be5.exe 35 PID 2312 wrote to memory of 2632 2312 1kU47Be5.exe 35 PID 2312 wrote to memory of 2632 2312 1kU47Be5.exe 35 PID 2312 wrote to memory of 2632 2312 1kU47Be5.exe 35 PID 2312 wrote to memory of 2632 2312 1kU47Be5.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.728dba84d073a71096a7f48ea0aa8f60.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.728dba84d073a71096a7f48ea0aa8f60.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\oY4NI20.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\oY4NI20.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nY4Nx95.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nY4Nx95.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nG4cb30.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nG4cb30.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1kU47Be5.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1kU47Be5.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2632
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5750b63e64942ae7aff35d2f53967a3aa
SHA1e8173d92ca6055115205498dfbe5bb4a4153caaa
SHA2566686f6a7f0197ef9334588a0d80b2338bac96d433fdb85329660ff25d1cec7e6
SHA5127965a71ea37d8757bbba596142ff3d673b68397572021b5525aafef2c9b0ddba685beff4ea03b3885ff1f88d6413c1882720e1ba6c641ab6020d4f87ac6e6273
-
Filesize
1.1MB
MD5750b63e64942ae7aff35d2f53967a3aa
SHA1e8173d92ca6055115205498dfbe5bb4a4153caaa
SHA2566686f6a7f0197ef9334588a0d80b2338bac96d433fdb85329660ff25d1cec7e6
SHA5127965a71ea37d8757bbba596142ff3d673b68397572021b5525aafef2c9b0ddba685beff4ea03b3885ff1f88d6413c1882720e1ba6c641ab6020d4f87ac6e6273
-
Filesize
691KB
MD5f932991c3f621426bbf5754ebc845b52
SHA1c0832927db39512b6a352926e6544d5d6dc25155
SHA25624d4c06f3f3e334c28a9948a33823648f9d5585df01af5d1ae704667f0f96d71
SHA512fb162943a32b6afe4ec91f5cfcb652faf8606bfd7c4bf7badd31606e65d22270badaade5bc842181e196c8f17ff8cef7b761aa6f3ce88059b7ca58e749478abc
-
Filesize
691KB
MD5f932991c3f621426bbf5754ebc845b52
SHA1c0832927db39512b6a352926e6544d5d6dc25155
SHA25624d4c06f3f3e334c28a9948a33823648f9d5585df01af5d1ae704667f0f96d71
SHA512fb162943a32b6afe4ec91f5cfcb652faf8606bfd7c4bf7badd31606e65d22270badaade5bc842181e196c8f17ff8cef7b761aa6f3ce88059b7ca58e749478abc
-
Filesize
330KB
MD5bf28c3c89d46a85e4d2b211a3710bd67
SHA1671df439bfcb9ed1052004243974b9484cd6ce8f
SHA25646d5dce7ef3794553a47a35674cfd28b5277217634104ee095faf3f0d33689b7
SHA51277d7b3a5d3e9569b6ea76bcc5a0ed174d4d39e725b6ba1938fb0aa186c6bf074c46a774b3db61c8db3c7c6977346c985aae406decd6b27efdc627bee1c05e36e
-
Filesize
330KB
MD5bf28c3c89d46a85e4d2b211a3710bd67
SHA1671df439bfcb9ed1052004243974b9484cd6ce8f
SHA25646d5dce7ef3794553a47a35674cfd28b5277217634104ee095faf3f0d33689b7
SHA51277d7b3a5d3e9569b6ea76bcc5a0ed174d4d39e725b6ba1938fb0aa186c6bf074c46a774b3db61c8db3c7c6977346c985aae406decd6b27efdc627bee1c05e36e
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
1.1MB
MD5750b63e64942ae7aff35d2f53967a3aa
SHA1e8173d92ca6055115205498dfbe5bb4a4153caaa
SHA2566686f6a7f0197ef9334588a0d80b2338bac96d433fdb85329660ff25d1cec7e6
SHA5127965a71ea37d8757bbba596142ff3d673b68397572021b5525aafef2c9b0ddba685beff4ea03b3885ff1f88d6413c1882720e1ba6c641ab6020d4f87ac6e6273
-
Filesize
1.1MB
MD5750b63e64942ae7aff35d2f53967a3aa
SHA1e8173d92ca6055115205498dfbe5bb4a4153caaa
SHA2566686f6a7f0197ef9334588a0d80b2338bac96d433fdb85329660ff25d1cec7e6
SHA5127965a71ea37d8757bbba596142ff3d673b68397572021b5525aafef2c9b0ddba685beff4ea03b3885ff1f88d6413c1882720e1ba6c641ab6020d4f87ac6e6273
-
Filesize
691KB
MD5f932991c3f621426bbf5754ebc845b52
SHA1c0832927db39512b6a352926e6544d5d6dc25155
SHA25624d4c06f3f3e334c28a9948a33823648f9d5585df01af5d1ae704667f0f96d71
SHA512fb162943a32b6afe4ec91f5cfcb652faf8606bfd7c4bf7badd31606e65d22270badaade5bc842181e196c8f17ff8cef7b761aa6f3ce88059b7ca58e749478abc
-
Filesize
691KB
MD5f932991c3f621426bbf5754ebc845b52
SHA1c0832927db39512b6a352926e6544d5d6dc25155
SHA25624d4c06f3f3e334c28a9948a33823648f9d5585df01af5d1ae704667f0f96d71
SHA512fb162943a32b6afe4ec91f5cfcb652faf8606bfd7c4bf7badd31606e65d22270badaade5bc842181e196c8f17ff8cef7b761aa6f3ce88059b7ca58e749478abc
-
Filesize
330KB
MD5bf28c3c89d46a85e4d2b211a3710bd67
SHA1671df439bfcb9ed1052004243974b9484cd6ce8f
SHA25646d5dce7ef3794553a47a35674cfd28b5277217634104ee095faf3f0d33689b7
SHA51277d7b3a5d3e9569b6ea76bcc5a0ed174d4d39e725b6ba1938fb0aa186c6bf074c46a774b3db61c8db3c7c6977346c985aae406decd6b27efdc627bee1c05e36e
-
Filesize
330KB
MD5bf28c3c89d46a85e4d2b211a3710bd67
SHA1671df439bfcb9ed1052004243974b9484cd6ce8f
SHA25646d5dce7ef3794553a47a35674cfd28b5277217634104ee095faf3f0d33689b7
SHA51277d7b3a5d3e9569b6ea76bcc5a0ed174d4d39e725b6ba1938fb0aa186c6bf074c46a774b3db61c8db3c7c6977346c985aae406decd6b27efdc627bee1c05e36e
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81