Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16/10/2023, 18:35
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.bc3434d2dc9a575b74aa117a8189a700.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.bc3434d2dc9a575b74aa117a8189a700.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.bc3434d2dc9a575b74aa117a8189a700.exe
-
Size
144KB
-
MD5
bc3434d2dc9a575b74aa117a8189a700
-
SHA1
7d69af30a63aa9a129de6b5cd00eea4ea8e2a685
-
SHA256
dab74117d676a88c2b9ce05cab076024f55af83e3bad09c8d7852f05c7f61543
-
SHA512
448af7951c1e1caf63e1865a3dd3893147cb001600dffe7fbba04fe163c227cbfb4247435ff3288883328997ce9b394f49d3aa27bba5c1905ec45ed4532a4178
-
SSDEEP
3072:ACHQ4z9lA8K6RHPMQH2qC7ZQOlzSLUK6MwGsGnDc9nhVizLrId0:ACH3q8KkHPMQWfdQOhwJ6MwGsmLrId0
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eojnkg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebjglbml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebjglbml.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad NEAS.bc3434d2dc9a575b74aa117a8189a700.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" NEAS.bc3434d2dc9a575b74aa117a8189a700.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edkcojga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Edkcojga.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eojnkg32.exe -
Executes dropped EXE 4 IoCs
pid Process 3036 Edkcojga.exe 2696 Eojnkg32.exe 2616 Ebjglbml.exe 1512 Fkckeh32.exe -
Loads dropped DLL 12 IoCs
pid Process 2820 NEAS.bc3434d2dc9a575b74aa117a8189a700.exe 2820 NEAS.bc3434d2dc9a575b74aa117a8189a700.exe 3036 Edkcojga.exe 3036 Edkcojga.exe 2696 Eojnkg32.exe 2696 Eojnkg32.exe 2616 Ebjglbml.exe 2616 Ebjglbml.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\Edkcojga.exe NEAS.bc3434d2dc9a575b74aa117a8189a700.exe File opened for modification C:\Windows\SysWOW64\Edkcojga.exe NEAS.bc3434d2dc9a575b74aa117a8189a700.exe File opened for modification C:\Windows\SysWOW64\Eojnkg32.exe Edkcojga.exe File created C:\Windows\SysWOW64\Clkmne32.dll Ebjglbml.exe File opened for modification C:\Windows\SysWOW64\Ebjglbml.exe Eojnkg32.exe File created C:\Windows\SysWOW64\Dmkmmi32.dll Eojnkg32.exe File created C:\Windows\SysWOW64\Fkckeh32.exe Ebjglbml.exe File opened for modification C:\Windows\SysWOW64\Fkckeh32.exe Ebjglbml.exe File created C:\Windows\SysWOW64\Gogcek32.dll NEAS.bc3434d2dc9a575b74aa117a8189a700.exe File created C:\Windows\SysWOW64\Eojnkg32.exe Edkcojga.exe File created C:\Windows\SysWOW64\Lkmkpl32.dll Edkcojga.exe File created C:\Windows\SysWOW64\Ebjglbml.exe Eojnkg32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2496 1512 WerFault.exe 31 -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} NEAS.bc3434d2dc9a575b74aa117a8189a700.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" NEAS.bc3434d2dc9a575b74aa117a8189a700.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Edkcojga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lkmkpl32.dll" Edkcojga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ebjglbml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ebjglbml.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 NEAS.bc3434d2dc9a575b74aa117a8189a700.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node NEAS.bc3434d2dc9a575b74aa117a8189a700.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID NEAS.bc3434d2dc9a575b74aa117a8189a700.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gogcek32.dll" NEAS.bc3434d2dc9a575b74aa117a8189a700.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eojnkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eojnkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clkmne32.dll" Ebjglbml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Edkcojga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dmkmmi32.dll" Eojnkg32.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2820 wrote to memory of 3036 2820 NEAS.bc3434d2dc9a575b74aa117a8189a700.exe 28 PID 2820 wrote to memory of 3036 2820 NEAS.bc3434d2dc9a575b74aa117a8189a700.exe 28 PID 2820 wrote to memory of 3036 2820 NEAS.bc3434d2dc9a575b74aa117a8189a700.exe 28 PID 2820 wrote to memory of 3036 2820 NEAS.bc3434d2dc9a575b74aa117a8189a700.exe 28 PID 3036 wrote to memory of 2696 3036 Edkcojga.exe 29 PID 3036 wrote to memory of 2696 3036 Edkcojga.exe 29 PID 3036 wrote to memory of 2696 3036 Edkcojga.exe 29 PID 3036 wrote to memory of 2696 3036 Edkcojga.exe 29 PID 2696 wrote to memory of 2616 2696 Eojnkg32.exe 30 PID 2696 wrote to memory of 2616 2696 Eojnkg32.exe 30 PID 2696 wrote to memory of 2616 2696 Eojnkg32.exe 30 PID 2696 wrote to memory of 2616 2696 Eojnkg32.exe 30 PID 2616 wrote to memory of 1512 2616 Ebjglbml.exe 31 PID 2616 wrote to memory of 1512 2616 Ebjglbml.exe 31 PID 2616 wrote to memory of 1512 2616 Ebjglbml.exe 31 PID 2616 wrote to memory of 1512 2616 Ebjglbml.exe 31 PID 1512 wrote to memory of 2496 1512 Fkckeh32.exe 32 PID 1512 wrote to memory of 2496 1512 Fkckeh32.exe 32 PID 1512 wrote to memory of 2496 1512 Fkckeh32.exe 32 PID 1512 wrote to memory of 2496 1512 Fkckeh32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.bc3434d2dc9a575b74aa117a8189a700.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.bc3434d2dc9a575b74aa117a8189a700.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\Edkcojga.exeC:\Windows\system32\Edkcojga.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\Eojnkg32.exeC:\Windows\system32\Eojnkg32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\Ebjglbml.exeC:\Windows\system32\Ebjglbml.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\Fkckeh32.exeC:\Windows\system32\Fkckeh32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1512 -s 1406⤵
- Loads dropped DLL
- Program crash
PID:2496
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD5a3b447d47434c647094f10494b03200b
SHA17a44661e51100a40d365c83154086f40fa232ae6
SHA2569325c3f526fc8ec65ede8d5d7075170ba129e0d3b105bf4eecf34f8b7df86bbe
SHA512a132566ca68cedf6d44b1d74ae6eeac0adcd403287e645553d643f8d6d02943f8d5c088e494970e63a0816d0bc133e6af2a65afd8a2a4329d5870b3eedab0032
-
Filesize
144KB
MD5a3b447d47434c647094f10494b03200b
SHA17a44661e51100a40d365c83154086f40fa232ae6
SHA2569325c3f526fc8ec65ede8d5d7075170ba129e0d3b105bf4eecf34f8b7df86bbe
SHA512a132566ca68cedf6d44b1d74ae6eeac0adcd403287e645553d643f8d6d02943f8d5c088e494970e63a0816d0bc133e6af2a65afd8a2a4329d5870b3eedab0032
-
Filesize
144KB
MD5a3b447d47434c647094f10494b03200b
SHA17a44661e51100a40d365c83154086f40fa232ae6
SHA2569325c3f526fc8ec65ede8d5d7075170ba129e0d3b105bf4eecf34f8b7df86bbe
SHA512a132566ca68cedf6d44b1d74ae6eeac0adcd403287e645553d643f8d6d02943f8d5c088e494970e63a0816d0bc133e6af2a65afd8a2a4329d5870b3eedab0032
-
Filesize
144KB
MD51c3d2cff19ab57a6208e96c697c77428
SHA17a67ad4658a6167dd339695892cd6eaf9183e762
SHA2563fe99da8334820cced8325a5b7b145dfe3aceb6cc81b677f9f24f5951518af98
SHA512c53c41b4db5d7fb20d8058d5509f47910c844b47a1bc70457a66f3058ce00d516e9a337ddbf6f9d93988dd24bd667f25d6f5dfc2147953c5634ce85596616d8b
-
Filesize
144KB
MD51c3d2cff19ab57a6208e96c697c77428
SHA17a67ad4658a6167dd339695892cd6eaf9183e762
SHA2563fe99da8334820cced8325a5b7b145dfe3aceb6cc81b677f9f24f5951518af98
SHA512c53c41b4db5d7fb20d8058d5509f47910c844b47a1bc70457a66f3058ce00d516e9a337ddbf6f9d93988dd24bd667f25d6f5dfc2147953c5634ce85596616d8b
-
Filesize
144KB
MD51c3d2cff19ab57a6208e96c697c77428
SHA17a67ad4658a6167dd339695892cd6eaf9183e762
SHA2563fe99da8334820cced8325a5b7b145dfe3aceb6cc81b677f9f24f5951518af98
SHA512c53c41b4db5d7fb20d8058d5509f47910c844b47a1bc70457a66f3058ce00d516e9a337ddbf6f9d93988dd24bd667f25d6f5dfc2147953c5634ce85596616d8b
-
Filesize
144KB
MD5e2a4a2ed3714731c113b366f1fc9b061
SHA119abd85aba468f0ddd6e39f264e9012f35a3c865
SHA256d2e5b4a45fcaf2d696ea7f53030a9bb808c5c50171066d13d771c79fb6f0d9cb
SHA512c2fb9899720a10e4385cb1354f6365e4e34ff286ab4a80dcb74a8841ec9b0809257151bf4330b6bac501fb3f66f7b6048d3c2de58fce82d6ac0c52cea89878d8
-
Filesize
144KB
MD5e2a4a2ed3714731c113b366f1fc9b061
SHA119abd85aba468f0ddd6e39f264e9012f35a3c865
SHA256d2e5b4a45fcaf2d696ea7f53030a9bb808c5c50171066d13d771c79fb6f0d9cb
SHA512c2fb9899720a10e4385cb1354f6365e4e34ff286ab4a80dcb74a8841ec9b0809257151bf4330b6bac501fb3f66f7b6048d3c2de58fce82d6ac0c52cea89878d8
-
Filesize
144KB
MD5e2a4a2ed3714731c113b366f1fc9b061
SHA119abd85aba468f0ddd6e39f264e9012f35a3c865
SHA256d2e5b4a45fcaf2d696ea7f53030a9bb808c5c50171066d13d771c79fb6f0d9cb
SHA512c2fb9899720a10e4385cb1354f6365e4e34ff286ab4a80dcb74a8841ec9b0809257151bf4330b6bac501fb3f66f7b6048d3c2de58fce82d6ac0c52cea89878d8
-
Filesize
144KB
MD5eeb0317258ccd847a2419ff9c335ce96
SHA13dcffb34ca88b0afc90161c750a717eab63485be
SHA256b54d3ef0fb3ddc67cc458fdd41d4936fa6c486b3b4bfbc8e604deb7cb19badf6
SHA512d50c8387bd0caf0c8fd706db7113ced3c223921f899234e82a69b6199561e0aaef8e4b5d26b0014e756ec50406bec40b3f1911b7718bf8afa82d169ee869e1de
-
Filesize
144KB
MD5eeb0317258ccd847a2419ff9c335ce96
SHA13dcffb34ca88b0afc90161c750a717eab63485be
SHA256b54d3ef0fb3ddc67cc458fdd41d4936fa6c486b3b4bfbc8e604deb7cb19badf6
SHA512d50c8387bd0caf0c8fd706db7113ced3c223921f899234e82a69b6199561e0aaef8e4b5d26b0014e756ec50406bec40b3f1911b7718bf8afa82d169ee869e1de
-
Filesize
144KB
MD5a3b447d47434c647094f10494b03200b
SHA17a44661e51100a40d365c83154086f40fa232ae6
SHA2569325c3f526fc8ec65ede8d5d7075170ba129e0d3b105bf4eecf34f8b7df86bbe
SHA512a132566ca68cedf6d44b1d74ae6eeac0adcd403287e645553d643f8d6d02943f8d5c088e494970e63a0816d0bc133e6af2a65afd8a2a4329d5870b3eedab0032
-
Filesize
144KB
MD5a3b447d47434c647094f10494b03200b
SHA17a44661e51100a40d365c83154086f40fa232ae6
SHA2569325c3f526fc8ec65ede8d5d7075170ba129e0d3b105bf4eecf34f8b7df86bbe
SHA512a132566ca68cedf6d44b1d74ae6eeac0adcd403287e645553d643f8d6d02943f8d5c088e494970e63a0816d0bc133e6af2a65afd8a2a4329d5870b3eedab0032
-
Filesize
144KB
MD51c3d2cff19ab57a6208e96c697c77428
SHA17a67ad4658a6167dd339695892cd6eaf9183e762
SHA2563fe99da8334820cced8325a5b7b145dfe3aceb6cc81b677f9f24f5951518af98
SHA512c53c41b4db5d7fb20d8058d5509f47910c844b47a1bc70457a66f3058ce00d516e9a337ddbf6f9d93988dd24bd667f25d6f5dfc2147953c5634ce85596616d8b
-
Filesize
144KB
MD51c3d2cff19ab57a6208e96c697c77428
SHA17a67ad4658a6167dd339695892cd6eaf9183e762
SHA2563fe99da8334820cced8325a5b7b145dfe3aceb6cc81b677f9f24f5951518af98
SHA512c53c41b4db5d7fb20d8058d5509f47910c844b47a1bc70457a66f3058ce00d516e9a337ddbf6f9d93988dd24bd667f25d6f5dfc2147953c5634ce85596616d8b
-
Filesize
144KB
MD5e2a4a2ed3714731c113b366f1fc9b061
SHA119abd85aba468f0ddd6e39f264e9012f35a3c865
SHA256d2e5b4a45fcaf2d696ea7f53030a9bb808c5c50171066d13d771c79fb6f0d9cb
SHA512c2fb9899720a10e4385cb1354f6365e4e34ff286ab4a80dcb74a8841ec9b0809257151bf4330b6bac501fb3f66f7b6048d3c2de58fce82d6ac0c52cea89878d8
-
Filesize
144KB
MD5e2a4a2ed3714731c113b366f1fc9b061
SHA119abd85aba468f0ddd6e39f264e9012f35a3c865
SHA256d2e5b4a45fcaf2d696ea7f53030a9bb808c5c50171066d13d771c79fb6f0d9cb
SHA512c2fb9899720a10e4385cb1354f6365e4e34ff286ab4a80dcb74a8841ec9b0809257151bf4330b6bac501fb3f66f7b6048d3c2de58fce82d6ac0c52cea89878d8
-
Filesize
144KB
MD5eeb0317258ccd847a2419ff9c335ce96
SHA13dcffb34ca88b0afc90161c750a717eab63485be
SHA256b54d3ef0fb3ddc67cc458fdd41d4936fa6c486b3b4bfbc8e604deb7cb19badf6
SHA512d50c8387bd0caf0c8fd706db7113ced3c223921f899234e82a69b6199561e0aaef8e4b5d26b0014e756ec50406bec40b3f1911b7718bf8afa82d169ee869e1de
-
Filesize
144KB
MD5eeb0317258ccd847a2419ff9c335ce96
SHA13dcffb34ca88b0afc90161c750a717eab63485be
SHA256b54d3ef0fb3ddc67cc458fdd41d4936fa6c486b3b4bfbc8e604deb7cb19badf6
SHA512d50c8387bd0caf0c8fd706db7113ced3c223921f899234e82a69b6199561e0aaef8e4b5d26b0014e756ec50406bec40b3f1911b7718bf8afa82d169ee869e1de
-
Filesize
144KB
MD5eeb0317258ccd847a2419ff9c335ce96
SHA13dcffb34ca88b0afc90161c750a717eab63485be
SHA256b54d3ef0fb3ddc67cc458fdd41d4936fa6c486b3b4bfbc8e604deb7cb19badf6
SHA512d50c8387bd0caf0c8fd706db7113ced3c223921f899234e82a69b6199561e0aaef8e4b5d26b0014e756ec50406bec40b3f1911b7718bf8afa82d169ee869e1de
-
Filesize
144KB
MD5eeb0317258ccd847a2419ff9c335ce96
SHA13dcffb34ca88b0afc90161c750a717eab63485be
SHA256b54d3ef0fb3ddc67cc458fdd41d4936fa6c486b3b4bfbc8e604deb7cb19badf6
SHA512d50c8387bd0caf0c8fd706db7113ced3c223921f899234e82a69b6199561e0aaef8e4b5d26b0014e756ec50406bec40b3f1911b7718bf8afa82d169ee869e1de
-
Filesize
144KB
MD5eeb0317258ccd847a2419ff9c335ce96
SHA13dcffb34ca88b0afc90161c750a717eab63485be
SHA256b54d3ef0fb3ddc67cc458fdd41d4936fa6c486b3b4bfbc8e604deb7cb19badf6
SHA512d50c8387bd0caf0c8fd706db7113ced3c223921f899234e82a69b6199561e0aaef8e4b5d26b0014e756ec50406bec40b3f1911b7718bf8afa82d169ee869e1de
-
Filesize
144KB
MD5eeb0317258ccd847a2419ff9c335ce96
SHA13dcffb34ca88b0afc90161c750a717eab63485be
SHA256b54d3ef0fb3ddc67cc458fdd41d4936fa6c486b3b4bfbc8e604deb7cb19badf6
SHA512d50c8387bd0caf0c8fd706db7113ced3c223921f899234e82a69b6199561e0aaef8e4b5d26b0014e756ec50406bec40b3f1911b7718bf8afa82d169ee869e1de