Analysis
-
max time kernel
253s -
max time network
284s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14-10-2023 19:16
Behavioral task
behavioral1
Sample
NEAS.dbd036a391e472106543a02a540145e0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.dbd036a391e472106543a02a540145e0.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.dbd036a391e472106543a02a540145e0.exe
-
Size
1.9MB
-
MD5
dbd036a391e472106543a02a540145e0
-
SHA1
66a8bb5354d7cf0ae759e8a7d33e7e5e0058035e
-
SHA256
aa8b7d7fec9ece14d64c350704cafb7fade515ad8529ecc8de3a1d87fff46b69
-
SHA512
b8d8d54684b85a6f69a446383614dc7fc2e5868490afbfef0c7a091bf83d0883a4259991acc4442d1be6d69863c9fbf533e2d926f5d3d7a3c86ad051f6446ab3
-
SSDEEP
24576:rEmvS3PLNyroPr4GGZdjfKRvI+2GRK4Nwb2/vBoRSXDcoklCYIR0jgJmxQ0gxmev:rE13D8c4GG/jfKCfGgSBsomexmeHP
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
resource yara_rule behavioral1/memory/2788-0-0x0000000000020000-0x00000000001CD000-memory.dmp upx behavioral1/memory/2788-1-0x0000000000020000-0x00000000001CD000-memory.dmp upx -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2540 explorer.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 2540 explorer.exe Token: SeShutdownPrivilege 2540 explorer.exe Token: SeShutdownPrivilege 2540 explorer.exe Token: SeShutdownPrivilege 2540 explorer.exe Token: SeShutdownPrivilege 2540 explorer.exe Token: SeShutdownPrivilege 2540 explorer.exe Token: SeShutdownPrivilege 2540 explorer.exe Token: SeShutdownPrivilege 2540 explorer.exe Token: SeShutdownPrivilege 2540 explorer.exe Token: SeShutdownPrivilege 2540 explorer.exe Token: SeShutdownPrivilege 2540 explorer.exe Token: SeShutdownPrivilege 2540 explorer.exe Token: 33 2972 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2972 AUDIODG.EXE Token: 33 2972 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2972 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.dbd036a391e472106543a02a540145e0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.dbd036a391e472106543a02a540145e0.exe"1⤵PID:2788
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2540
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5101⤵
- Suspicious use of AdjustPrivilegeToken
PID:2972