Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16/10/2023, 14:53
Behavioral task
behavioral1
Sample
NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe
-
Size
196KB
-
MD5
fdfba53e7a0fdc3115ef4d07eff2ff9c
-
SHA1
7c34a7a52fb2cffb7ec58e598463ed9662dae461
-
SHA256
9b5ec347380527c7c88a295636fbd2cd8a4dcfc0dbb4a74bd0a73d31be4af292
-
SHA512
371ac80e371f941416cfd00ffba20271276eedb16c8026d393d6494a1b9519f7913dea5a79f55d43aa1094beaa2df97f447c651010f84979e56388766c93a7b3
-
SSDEEP
3072:ZOgUXoutNzOgUXoutN04/awxfodLJUBv9Bsor1rHjhMU9npQQpmuG:ZFYoSNFYoS1RoYlld9n2Qpmx
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 11 IoCs
pid Process 2876 xk.exe 3000 IExplorer.exe 2816 WINLOGON.EXE 1588 CSRSS.EXE 1568 xk.exe 1420 IExplorer.exe 2032 WINLOGON.EXE 2096 CSRSS.EXE 2176 SERVICES.EXE 524 LSASS.EXE 840 SMSS.EXE -
Loads dropped DLL 18 IoCs
pid Process 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe -
resource yara_rule behavioral1/memory/3052-0-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0007000000015c71-8.dat upx behavioral1/files/0x0009000000015cae-109.dat upx behavioral1/memory/2876-111-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2876-114-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x000600000001624b-115.dat upx behavioral1/files/0x000600000001624b-117.dat upx behavioral1/files/0x000600000001624b-121.dat upx behavioral1/memory/3000-124-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x000600000001643c-127.dat upx behavioral1/memory/2816-133-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x000600000001643c-132.dat upx behavioral1/files/0x000600000001643c-125.dat upx behavioral1/memory/2816-136-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x000600000001657c-137.dat upx behavioral1/files/0x000600000001657c-139.dat upx behavioral1/files/0x000600000001657c-144.dat upx behavioral1/memory/3052-143-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1588-156-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0009000000015cae-196.dat upx behavioral1/memory/1568-205-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x000600000001624b-201.dat upx behavioral1/files/0x000600000001624b-206.dat upx behavioral1/files/0x000600000001624b-199.dat upx behavioral1/memory/1420-210-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x000600000001643c-209.dat upx behavioral1/files/0x000600000001643c-212.dat upx behavioral1/files/0x000600000001643c-216.dat upx behavioral1/files/0x000600000001657c-221.dat upx behavioral1/memory/2032-225-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x000600000001657c-226.dat upx behavioral1/files/0x000600000001657c-219.dat upx behavioral1/memory/2096-229-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x00060000000165e9-230.dat upx behavioral1/files/0x00060000000165e9-232.dat upx behavioral1/files/0x00060000000165e9-237.dat upx behavioral1/memory/3052-236-0x0000000000770000-0x000000000079F000-memory.dmp upx behavioral1/memory/524-248-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x00060000000167e9-247.dat upx behavioral1/memory/2176-240-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x00060000000167e9-243.dat upx behavioral1/files/0x00060000000167e9-241.dat upx behavioral1/memory/524-251-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0006000000016abc-252.dat upx behavioral1/files/0x0006000000016abc-254.dat upx behavioral1/files/0x0006000000016abc-258.dat upx behavioral1/memory/840-261-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/3052-301-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification C:\desktop.ini NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File created C:\desktop.ini NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File opened for modification F:\desktop.ini NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File created F:\desktop.ini NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File opened (read-only) \??\K: NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File opened (read-only) \??\O: NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File opened (read-only) \??\R: NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File opened (read-only) \??\T: NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File opened (read-only) \??\Y: NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File opened (read-only) \??\I: NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File opened (read-only) \??\L: NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File opened (read-only) \??\P: NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File opened (read-only) \??\U: NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File opened (read-only) \??\V: NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File opened (read-only) \??\G: NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File opened (read-only) \??\H: NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File opened (read-only) \??\J: NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File opened (read-only) \??\M: NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File opened (read-only) \??\N: NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File opened (read-only) \??\Q: NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File opened (read-only) \??\S: NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File opened (read-only) \??\W: NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File opened (read-only) \??\B: NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File opened (read-only) \??\X: NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File opened (read-only) \??\Z: NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell.exe NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File created C:\Windows\system32\perfc00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfh011.dat OUTLOOK.EXE File created C:\Windows\system32\perfc007.dat OUTLOOK.EXE File created C:\Windows\system32\perfh007.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00C.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\Mig2.scr NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File created C:\Windows\system32\perfc009.dat OUTLOOK.EXE File created C:\Windows\system32\perfh010.dat OUTLOOK.EXE File created C:\Windows\system32\perfc011.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfc010.dat OUTLOOK.EXE File opened for modification C:\Windows\SysWOW64\shell.exe NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File created C:\Windows\SysWOW64\IExplorer.exe NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File created C:\Windows\SysWOW64\PerfStringBackup.TMP OUTLOOK.EXE File opened for modification C:\Windows\SysWOW64\PerfStringBackup.INI OUTLOOK.EXE File created C:\Windows\system32\perfh009.dat OUTLOOK.EXE -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File created C:\Windows\xk.exe NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe File created C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File opened for modification C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File created C:\Windows\inf\Outlook\0009\outlperf.ini OUTLOOK.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\ NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\MenuExt OUTLOOK.EXE Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" OUTLOOK.EXE Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Toolbar OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" OUTLOOK.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672EE-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006303E-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E0-0000-0000-C000-000000000046}\ = "_TextRuleCondition" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063096-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063037-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672DE-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672E3-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00067367-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063022-0000-0000-C000-000000000046}\ = "_JournalItem" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063101-0000-0000-C000-000000000046}\ = "_Conversation" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630C4-0000-0000-C000-000000000046}\ = "_Accounts" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063089-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630A7-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CA-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063035-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672E5-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672DE-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630FD-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D8-0000-0000-C000-000000000046}\ = "_RuleConditions" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630FA-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006300C-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006309E-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F0-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F9-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672FA-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630C8-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006302F-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063075-0000-0000-C000-000000000046}\ = "OutlookBarShortcut" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063081-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630DE-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630C4-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063026-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006303D-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E5-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006309B-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063024-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006307F-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006302C-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F7-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E3-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006300B-0000-0000-C000-000000000046}\ = "Search" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006309A-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00067366-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F7-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063035-0000-0000-C000-000000000046}\ = "_TaskItem" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006307B-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063093-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E3-0000-0000-C000-000000000046}\ = "_Category" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D3-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063047-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672DC-0000-0000-C000-000000000046}\ = "_OlkOptionButton" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D8-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063003-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063070-0000-0000-C000-000000000046}\ = "_OutlookBarPane" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630EF-0000-0000-C000-000000000046}\ = "_NavigationGroups" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063026-0000-0000-C000-000000000046}\ = "_ReportItem" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006304B-0000-0000-C000-000000000046}\ = "AddressEntry" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063040-0000-0000-C000-000000000046}\ = "_Folders" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063008-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063098-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006F025-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CD-0000-0000-C000-000000000046}\ = "_Rule" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063045-0000-0000-C000-000000000046}\ = "Recipient" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630DE-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2940 OUTLOOK.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2940 OUTLOOK.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2940 OUTLOOK.EXE 2940 OUTLOOK.EXE 2940 OUTLOOK.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2940 OUTLOOK.EXE 2940 OUTLOOK.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 2876 xk.exe 3000 IExplorer.exe 2816 WINLOGON.EXE 1588 CSRSS.EXE 1568 xk.exe 1420 IExplorer.exe 2032 WINLOGON.EXE 2096 CSRSS.EXE 2176 SERVICES.EXE 524 LSASS.EXE 840 SMSS.EXE 2940 OUTLOOK.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2876 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 28 PID 3052 wrote to memory of 2876 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 28 PID 3052 wrote to memory of 2876 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 28 PID 3052 wrote to memory of 2876 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 28 PID 3052 wrote to memory of 3000 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 29 PID 3052 wrote to memory of 3000 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 29 PID 3052 wrote to memory of 3000 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 29 PID 3052 wrote to memory of 3000 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 29 PID 3052 wrote to memory of 2816 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 30 PID 3052 wrote to memory of 2816 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 30 PID 3052 wrote to memory of 2816 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 30 PID 3052 wrote to memory of 2816 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 30 PID 3052 wrote to memory of 1588 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 31 PID 3052 wrote to memory of 1588 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 31 PID 3052 wrote to memory of 1588 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 31 PID 3052 wrote to memory of 1588 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 31 PID 3052 wrote to memory of 1568 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 32 PID 3052 wrote to memory of 1568 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 32 PID 3052 wrote to memory of 1568 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 32 PID 3052 wrote to memory of 1568 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 32 PID 3052 wrote to memory of 1420 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 33 PID 3052 wrote to memory of 1420 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 33 PID 3052 wrote to memory of 1420 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 33 PID 3052 wrote to memory of 1420 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 33 PID 3052 wrote to memory of 2032 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 34 PID 3052 wrote to memory of 2032 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 34 PID 3052 wrote to memory of 2032 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 34 PID 3052 wrote to memory of 2032 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 34 PID 3052 wrote to memory of 2096 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 35 PID 3052 wrote to memory of 2096 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 35 PID 3052 wrote to memory of 2096 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 35 PID 3052 wrote to memory of 2096 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 35 PID 3052 wrote to memory of 2176 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 36 PID 3052 wrote to memory of 2176 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 36 PID 3052 wrote to memory of 2176 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 36 PID 3052 wrote to memory of 2176 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 36 PID 3052 wrote to memory of 524 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 37 PID 3052 wrote to memory of 524 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 37 PID 3052 wrote to memory of 524 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 37 PID 3052 wrote to memory of 524 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 37 PID 3052 wrote to memory of 840 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 38 PID 3052 wrote to memory of 840 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 38 PID 3052 wrote to memory of 840 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 38 PID 3052 wrote to memory of 840 3052 NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe 38 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.NEASfdfba53e7a0fdc3115ef4d07eff2ff9cexe_JC.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3052 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2876
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3000
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2816
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1588
-
-
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1568
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1420
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2032
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2096
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2176
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:524
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:840
-
-
C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE"C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2940
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD53f1e3009817b1d9ef8f7e560db541024
SHA139814e0f331f802ce8016b9bc6a27e26fbb0ea1e
SHA256c53b4e18ba833f9b78482ec65e7bf6a5b93f0397b606e78349caec52ca20450a
SHA5123a7393a57bf7275ffb50ecbd9099dfad6982bf668972d19a7bd96c6de645434ff2f821911e54f130f65ecf90cb949c8e1aec0c7d0809a931f040174c6d4b6944
-
Filesize
196KB
MD5e74e35d1c3983612fc65827aa7e29f03
SHA14025c14829307f10255178a6c547f94a6c6a9d99
SHA2566e555b366d28a80d4b3e63437e7b3c43cc71a01cd31423ca77f58a35b2d57446
SHA5126730144ae3ddaf348fef2d89ec913e3e35a9fecad0083636afeb168f8b258874ee32c9dfccb8560bbbba20e25a6425f710ad7050554c6de1a0780a2d8e24c510
-
Filesize
196KB
MD5e74e35d1c3983612fc65827aa7e29f03
SHA14025c14829307f10255178a6c547f94a6c6a9d99
SHA2566e555b366d28a80d4b3e63437e7b3c43cc71a01cd31423ca77f58a35b2d57446
SHA5126730144ae3ddaf348fef2d89ec913e3e35a9fecad0083636afeb168f8b258874ee32c9dfccb8560bbbba20e25a6425f710ad7050554c6de1a0780a2d8e24c510
-
Filesize
196KB
MD5e74b76a4fce2fd6abd6d6aceaa206b4e
SHA13fd59e4b6c021cd3c10647f84fa0238aa4e6be83
SHA256d773886cf10268e083213929215300e03a0e90a6f00c0f9ab66de05fadf92637
SHA512aeffb98d8e0cb0d6adcc86b930dd9123def7b9e58879613c26b503730e754ec93ebeb43c488d2d77a8fb29f86800168d623055438abb449b932cb10bbedab258
-
Filesize
196KB
MD5c5d3776d45b00ab2d93ebe4c72ab5253
SHA1861b3e119f8c384745289a4eb55b20371ebdb806
SHA256e84fe820187323567c4ce9bc900608db1fda9ba05d3fabf3dad603a7d704309b
SHA51263c3753484607be0b1e3571eae11164ef203e279e99cd8b3ee81a348e94b713a11d9225abcef2756e28da23727d49f457f63050af7348fc55a09a2cb13057e7e
-
Filesize
196KB
MD5c2e3a6420c5fb67843e83c9aef93f684
SHA16f0587852f8305d852fdcc3cf9245076f1382bb6
SHA25618116be8ddf6529345984bd7cc8737df58775b844ffaaf6a76df39830234c295
SHA512d7fd9bfca7897d7541cc8a2d563f65aa76b9192de0b6aedd5041a68ae3df09e98d9d62eb573d8e24bb6da0ec6beaca91c51f216f3b3b473bb5061a2b109d075b
-
Filesize
196KB
MD56124528f9b035c335e6a5bd94f07d7a5
SHA17b32dad276b7bd85b482a77059c4e76cd9a32ebb
SHA2560479aaaeb376d6d53391746dca09c6ca5a0c2d4333ae904edf58af2bc3b3197d
SHA512c6a82823bbe99077821bc0cde092f6333218bd51c80a809d1335ccbc9f0e87f6bc9f921bf4002a3a28dc6d64cd49967f0246371a2e9b1eb89d0e5112eab025dc
-
Filesize
196KB
MD56124528f9b035c335e6a5bd94f07d7a5
SHA17b32dad276b7bd85b482a77059c4e76cd9a32ebb
SHA2560479aaaeb376d6d53391746dca09c6ca5a0c2d4333ae904edf58af2bc3b3197d
SHA512c6a82823bbe99077821bc0cde092f6333218bd51c80a809d1335ccbc9f0e87f6bc9f921bf4002a3a28dc6d64cd49967f0246371a2e9b1eb89d0e5112eab025dc
-
Filesize
196KB
MD5fdfba53e7a0fdc3115ef4d07eff2ff9c
SHA17c34a7a52fb2cffb7ec58e598463ed9662dae461
SHA2569b5ec347380527c7c88a295636fbd2cd8a4dcfc0dbb4a74bd0a73d31be4af292
SHA512371ac80e371f941416cfd00ffba20271276eedb16c8026d393d6494a1b9519f7913dea5a79f55d43aa1094beaa2df97f447c651010f84979e56388766c93a7b3
-
Filesize
196KB
MD58909db14121ca33b5b768e82d3efa2cc
SHA1a843c76310413cf150f10c57cb090926214200ab
SHA25606f36a58b0b10b35a1d690bfc7465e4001e4ffb8668196625e5d665f23478699
SHA5128d66b72a8b39ceb6854b46e7e45130983a706a3def7d013960206eddc48d5e5c19dcf157809fefa0c043ac3b6119a5a64957fda371bf86ec8d19656773369f64
-
Filesize
196KB
MD58909db14121ca33b5b768e82d3efa2cc
SHA1a843c76310413cf150f10c57cb090926214200ab
SHA25606f36a58b0b10b35a1d690bfc7465e4001e4ffb8668196625e5d665f23478699
SHA5128d66b72a8b39ceb6854b46e7e45130983a706a3def7d013960206eddc48d5e5c19dcf157809fefa0c043ac3b6119a5a64957fda371bf86ec8d19656773369f64
-
Filesize
196KB
MD55e7230c937b76e728e157d528b7041b3
SHA123a853bdc4c6401810e02bc68828438c48538596
SHA256116f86531c00d5e948bf2f3e55f2c87e93f7daa83cb3d070f378422361dffe74
SHA5129136ac6adc3bb12fe56193313b2c39786b58d131340674fff7c857bcce17652d574e7d3c7537a2f285439ba108a46fcb297a9ee5409aae5d63177d560d95ac30
-
Filesize
196KB
MD55e7230c937b76e728e157d528b7041b3
SHA123a853bdc4c6401810e02bc68828438c48538596
SHA256116f86531c00d5e948bf2f3e55f2c87e93f7daa83cb3d070f378422361dffe74
SHA5129136ac6adc3bb12fe56193313b2c39786b58d131340674fff7c857bcce17652d574e7d3c7537a2f285439ba108a46fcb297a9ee5409aae5d63177d560d95ac30
-
Filesize
196KB
MD5e74e35d1c3983612fc65827aa7e29f03
SHA14025c14829307f10255178a6c547f94a6c6a9d99
SHA2566e555b366d28a80d4b3e63437e7b3c43cc71a01cd31423ca77f58a35b2d57446
SHA5126730144ae3ddaf348fef2d89ec913e3e35a9fecad0083636afeb168f8b258874ee32c9dfccb8560bbbba20e25a6425f710ad7050554c6de1a0780a2d8e24c510
-
Filesize
196KB
MD5e74e35d1c3983612fc65827aa7e29f03
SHA14025c14829307f10255178a6c547f94a6c6a9d99
SHA2566e555b366d28a80d4b3e63437e7b3c43cc71a01cd31423ca77f58a35b2d57446
SHA5126730144ae3ddaf348fef2d89ec913e3e35a9fecad0083636afeb168f8b258874ee32c9dfccb8560bbbba20e25a6425f710ad7050554c6de1a0780a2d8e24c510
-
Filesize
196KB
MD5e74e35d1c3983612fc65827aa7e29f03
SHA14025c14829307f10255178a6c547f94a6c6a9d99
SHA2566e555b366d28a80d4b3e63437e7b3c43cc71a01cd31423ca77f58a35b2d57446
SHA5126730144ae3ddaf348fef2d89ec913e3e35a9fecad0083636afeb168f8b258874ee32c9dfccb8560bbbba20e25a6425f710ad7050554c6de1a0780a2d8e24c510
-
Filesize
196KB
MD5e74e35d1c3983612fc65827aa7e29f03
SHA14025c14829307f10255178a6c547f94a6c6a9d99
SHA2566e555b366d28a80d4b3e63437e7b3c43cc71a01cd31423ca77f58a35b2d57446
SHA5126730144ae3ddaf348fef2d89ec913e3e35a9fecad0083636afeb168f8b258874ee32c9dfccb8560bbbba20e25a6425f710ad7050554c6de1a0780a2d8e24c510
-
Filesize
196KB
MD5e74b76a4fce2fd6abd6d6aceaa206b4e
SHA13fd59e4b6c021cd3c10647f84fa0238aa4e6be83
SHA256d773886cf10268e083213929215300e03a0e90a6f00c0f9ab66de05fadf92637
SHA512aeffb98d8e0cb0d6adcc86b930dd9123def7b9e58879613c26b503730e754ec93ebeb43c488d2d77a8fb29f86800168d623055438abb449b932cb10bbedab258
-
Filesize
196KB
MD5e74b76a4fce2fd6abd6d6aceaa206b4e
SHA13fd59e4b6c021cd3c10647f84fa0238aa4e6be83
SHA256d773886cf10268e083213929215300e03a0e90a6f00c0f9ab66de05fadf92637
SHA512aeffb98d8e0cb0d6adcc86b930dd9123def7b9e58879613c26b503730e754ec93ebeb43c488d2d77a8fb29f86800168d623055438abb449b932cb10bbedab258
-
Filesize
196KB
MD5c5d3776d45b00ab2d93ebe4c72ab5253
SHA1861b3e119f8c384745289a4eb55b20371ebdb806
SHA256e84fe820187323567c4ce9bc900608db1fda9ba05d3fabf3dad603a7d704309b
SHA51263c3753484607be0b1e3571eae11164ef203e279e99cd8b3ee81a348e94b713a11d9225abcef2756e28da23727d49f457f63050af7348fc55a09a2cb13057e7e
-
Filesize
196KB
MD5c5d3776d45b00ab2d93ebe4c72ab5253
SHA1861b3e119f8c384745289a4eb55b20371ebdb806
SHA256e84fe820187323567c4ce9bc900608db1fda9ba05d3fabf3dad603a7d704309b
SHA51263c3753484607be0b1e3571eae11164ef203e279e99cd8b3ee81a348e94b713a11d9225abcef2756e28da23727d49f457f63050af7348fc55a09a2cb13057e7e
-
Filesize
196KB
MD5c2e3a6420c5fb67843e83c9aef93f684
SHA16f0587852f8305d852fdcc3cf9245076f1382bb6
SHA25618116be8ddf6529345984bd7cc8737df58775b844ffaaf6a76df39830234c295
SHA512d7fd9bfca7897d7541cc8a2d563f65aa76b9192de0b6aedd5041a68ae3df09e98d9d62eb573d8e24bb6da0ec6beaca91c51f216f3b3b473bb5061a2b109d075b
-
Filesize
196KB
MD5c2e3a6420c5fb67843e83c9aef93f684
SHA16f0587852f8305d852fdcc3cf9245076f1382bb6
SHA25618116be8ddf6529345984bd7cc8737df58775b844ffaaf6a76df39830234c295
SHA512d7fd9bfca7897d7541cc8a2d563f65aa76b9192de0b6aedd5041a68ae3df09e98d9d62eb573d8e24bb6da0ec6beaca91c51f216f3b3b473bb5061a2b109d075b
-
Filesize
196KB
MD56124528f9b035c335e6a5bd94f07d7a5
SHA17b32dad276b7bd85b482a77059c4e76cd9a32ebb
SHA2560479aaaeb376d6d53391746dca09c6ca5a0c2d4333ae904edf58af2bc3b3197d
SHA512c6a82823bbe99077821bc0cde092f6333218bd51c80a809d1335ccbc9f0e87f6bc9f921bf4002a3a28dc6d64cd49967f0246371a2e9b1eb89d0e5112eab025dc
-
Filesize
196KB
MD56124528f9b035c335e6a5bd94f07d7a5
SHA17b32dad276b7bd85b482a77059c4e76cd9a32ebb
SHA2560479aaaeb376d6d53391746dca09c6ca5a0c2d4333ae904edf58af2bc3b3197d
SHA512c6a82823bbe99077821bc0cde092f6333218bd51c80a809d1335ccbc9f0e87f6bc9f921bf4002a3a28dc6d64cd49967f0246371a2e9b1eb89d0e5112eab025dc
-
Filesize
196KB
MD56124528f9b035c335e6a5bd94f07d7a5
SHA17b32dad276b7bd85b482a77059c4e76cd9a32ebb
SHA2560479aaaeb376d6d53391746dca09c6ca5a0c2d4333ae904edf58af2bc3b3197d
SHA512c6a82823bbe99077821bc0cde092f6333218bd51c80a809d1335ccbc9f0e87f6bc9f921bf4002a3a28dc6d64cd49967f0246371a2e9b1eb89d0e5112eab025dc
-
Filesize
196KB
MD56124528f9b035c335e6a5bd94f07d7a5
SHA17b32dad276b7bd85b482a77059c4e76cd9a32ebb
SHA2560479aaaeb376d6d53391746dca09c6ca5a0c2d4333ae904edf58af2bc3b3197d
SHA512c6a82823bbe99077821bc0cde092f6333218bd51c80a809d1335ccbc9f0e87f6bc9f921bf4002a3a28dc6d64cd49967f0246371a2e9b1eb89d0e5112eab025dc
-
Filesize
196KB
MD58909db14121ca33b5b768e82d3efa2cc
SHA1a843c76310413cf150f10c57cb090926214200ab
SHA25606f36a58b0b10b35a1d690bfc7465e4001e4ffb8668196625e5d665f23478699
SHA5128d66b72a8b39ceb6854b46e7e45130983a706a3def7d013960206eddc48d5e5c19dcf157809fefa0c043ac3b6119a5a64957fda371bf86ec8d19656773369f64
-
Filesize
196KB
MD58909db14121ca33b5b768e82d3efa2cc
SHA1a843c76310413cf150f10c57cb090926214200ab
SHA25606f36a58b0b10b35a1d690bfc7465e4001e4ffb8668196625e5d665f23478699
SHA5128d66b72a8b39ceb6854b46e7e45130983a706a3def7d013960206eddc48d5e5c19dcf157809fefa0c043ac3b6119a5a64957fda371bf86ec8d19656773369f64
-
Filesize
196KB
MD58909db14121ca33b5b768e82d3efa2cc
SHA1a843c76310413cf150f10c57cb090926214200ab
SHA25606f36a58b0b10b35a1d690bfc7465e4001e4ffb8668196625e5d665f23478699
SHA5128d66b72a8b39ceb6854b46e7e45130983a706a3def7d013960206eddc48d5e5c19dcf157809fefa0c043ac3b6119a5a64957fda371bf86ec8d19656773369f64
-
Filesize
196KB
MD58909db14121ca33b5b768e82d3efa2cc
SHA1a843c76310413cf150f10c57cb090926214200ab
SHA25606f36a58b0b10b35a1d690bfc7465e4001e4ffb8668196625e5d665f23478699
SHA5128d66b72a8b39ceb6854b46e7e45130983a706a3def7d013960206eddc48d5e5c19dcf157809fefa0c043ac3b6119a5a64957fda371bf86ec8d19656773369f64