Analysis
-
max time kernel
155s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2023 18:25
Behavioral task
behavioral1
Sample
NEAS.779a64ef52d3a6619d6d1be3a7451740.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.779a64ef52d3a6619d6d1be3a7451740.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.779a64ef52d3a6619d6d1be3a7451740.exe
-
Size
483KB
-
MD5
779a64ef52d3a6619d6d1be3a7451740
-
SHA1
b23a8f11f29cc3aa6697c0f6401735bee5fa8b8f
-
SHA256
fa887b14f58c84418bcc69e5cb39ef76d27367c960c9d16b980ab973a017ddc8
-
SHA512
4543ec62e673535430f5a7f0d524a155a409df306465555e6ccfe9bf79396aecafeef62da66efa0239a2541e28640bcf378a850b8995a21bcb2ba24f44338712
-
SSDEEP
6144:WdspDeDrxkg/vrMuJIgwhEFHyOrJcX/Pgqwzm5IzkWjS4e4azExBKO1t4Kb70Nqr:s8kxNhOZElO5kkWjhD4AI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1804 RGXATNW.EXE -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command RGXATNW.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\$Recycle.Bin\\OGN.EXE \"%1\" %*" RGXATNW.EXE -
resource yara_rule behavioral2/memory/1800-0-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral2/files/0x000100000000002a-10.dat upx behavioral2/files/0x000200000002281a-21.dat upx behavioral2/files/0x000200000002281a-22.dat upx behavioral2/memory/1800-24-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral2/memory/1804-25-0x0000000000400000-0x0000000000470000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RIFT.EXE = "C:\\Program Files\\RIFT.EXE" NEAS.779a64ef52d3a6619d6d1be3a7451740.exe -
Enumerates connected drives 3 TTPs 34 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: RGXATNW.EXE File opened (read-only) \??\G: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\K: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\L: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\Q: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\V: RGXATNW.EXE File opened (read-only) \??\I: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\R: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\V: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\J: RGXATNW.EXE File opened (read-only) \??\E: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\O: RGXATNW.EXE File opened (read-only) \??\R: RGXATNW.EXE File opened (read-only) \??\S: RGXATNW.EXE File opened (read-only) \??\P: RGXATNW.EXE File opened (read-only) \??\H: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\M: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\L: RGXATNW.EXE File opened (read-only) \??\N: RGXATNW.EXE File opened (read-only) \??\J: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\N: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\U: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\M: RGXATNW.EXE File opened (read-only) \??\E: RGXATNW.EXE File opened (read-only) \??\G: RGXATNW.EXE File opened (read-only) \??\Q: RGXATNW.EXE File opened (read-only) \??\H: RGXATNW.EXE File opened (read-only) \??\I: RGXATNW.EXE File opened (read-only) \??\T: RGXATNW.EXE File opened (read-only) \??\O: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\P: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\S: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\T: NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened (read-only) \??\K: RGXATNW.EXE -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\RIFT.EXE NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File opened for modification C:\Program Files\RIFT.EXE NEAS.779a64ef52d3a6619d6d1be3a7451740.exe File created C:\Program Files\YSAK.EXE NEAS.779a64ef52d3a6619d6d1be3a7451740.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\RGXATNW.EXE NEAS.779a64ef52d3a6619d6d1be3a7451740.exe -
Modifies registry class 17 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell\open NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open\command\ = "C:\\Program Files\\RIFT.EXE %1" NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open\command\ = "C:\\Program Files\\RIFT.EXE \"%1\" %*" NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open\command NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open\command\ = "F:\\$RECYCLE.BIN\\GEDUMNP.EXE \"%1\"" NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "F:\\$RECYCLE.BIN\\GEDUMNP.EXE %1" NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell\open\command NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command RGXATNW.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\$Recycle.Bin\\OGN.EXE \"%1\" %*" RGXATNW.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell\open\command\ = "F:\\$RECYCLE.BIN\\GEDUMNP.EXE %1" NEAS.779a64ef52d3a6619d6d1be3a7451740.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open\command NEAS.779a64ef52d3a6619d6d1be3a7451740.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1804 RGXATNW.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1800 wrote to memory of 1804 1800 NEAS.779a64ef52d3a6619d6d1be3a7451740.exe 83 PID 1800 wrote to memory of 1804 1800 NEAS.779a64ef52d3a6619d6d1be3a7451740.exe 83 PID 1800 wrote to memory of 1804 1800 NEAS.779a64ef52d3a6619d6d1be3a7451740.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.779a64ef52d3a6619d6d1be3a7451740.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.779a64ef52d3a6619d6d1be3a7451740.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\RGXATNW.EXEC:\Windows\RGXATNW.EXE2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:1804
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD52352502ebb345133595e4c01b6500cf7
SHA1467659928122d2b221f4003828aa4d7cb7da49ac
SHA2567d1760cec4e39c71f9e9f253904be1ded6ddfb1940ecdf7925efb9bd9af20abc
SHA512673bfa2d9f460067661b2f12d86a3e4fd94a39d9f0f48bd56277d1d6c5e51c8faf188a65b530258fae7fb9a06492125dfa44f4f3909f7999d2b320df287fad1a
-
Filesize
484KB
MD52352502ebb345133595e4c01b6500cf7
SHA1467659928122d2b221f4003828aa4d7cb7da49ac
SHA2567d1760cec4e39c71f9e9f253904be1ded6ddfb1940ecdf7925efb9bd9af20abc
SHA512673bfa2d9f460067661b2f12d86a3e4fd94a39d9f0f48bd56277d1d6c5e51c8faf188a65b530258fae7fb9a06492125dfa44f4f3909f7999d2b320df287fad1a
-
Filesize
484KB
MD559173a7ecf614dc2149f03cd0bba8d1f
SHA199aca5f4d0d91d14360dc827421108a69a87a45a
SHA25631a868e87e6e42af8c40aaff7852c5aab67e9ce5b84b17a4baca0c2d325bc1e8
SHA51227c3354dd643ebfb557741120d611acb5cf6009bfa1b608c7412bb3c98a9980519afbecc745302e03f50c32c9e2bc8b7117ff733b6bfb8b79c675fa2a3eb6ddf
-
Filesize
273B
MD523520138624e96d6f13041a395fd1994
SHA1fe1e7fa38c205d3f5ec8a3135bae87bead0cdaa2
SHA2569f8684b1ad705469b70e562fad0518a68f366252db3fdf773be8523905d0d750
SHA51230f762cbae0502a732350703348692f9526b72481bac468c3b036e13c9ff12d58e16e0f0fb5ee1f2cdcf71685664d86c49bef7886c4c5a4686feb5853bd9bd6a