Analysis

  • max time kernel
    120s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    16/10/2023, 18:37

General

  • Target

    NEAS.c8661024de4e069aa74e24cacb68ca20.exe

  • Size

    42KB

  • MD5

    c8661024de4e069aa74e24cacb68ca20

  • SHA1

    8461dbc56f1bace05e46bb5c6f213a6c5e2f66f2

  • SHA256

    61a3adefdea662a81a89851d6a47913121dbd165b3352c32210ceae48f33accf

  • SHA512

    8d7da7262139aeaad7a10e359ba084873cfc3266e13e2dde4d79d9bc067dbca7ac692a0de29a6737d85ec7b529d69566539faf16b05b69f6c3e95a0173574b02

  • SSDEEP

    768:C/+8ldkxYXO5lsvhBznbcuyD7UTy3wy3BEywe0u:6+8ldkxOO5Sv/znouy8TuzuK

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Sets file execution options in registry 2 TTPs 8 IoCs
  • Drops file in Program Files directory 42 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 37 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.c8661024de4e069aa74e24cacb68ca20.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.c8661024de4e069aa74e24cacb68ca20.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Sets file execution options in registry
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2060
    • C:\Windows\SysWOW64\Explorer.exe
      Explorer C:\Users\Admin\AppData\Local\Temp\NEAS.c8661024de4e069aa74e24cacb68ca20
      2⤵
        PID:2876
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2648

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Thumbs.db

      Filesize

      13B

      MD5

      3579c8da7f1e0ad94656e76c886e5125

      SHA1

      83eb531bfd10f917770441c7f548dcd841e70fdd

      SHA256

      b08022d315cf1eb12d2665bded0e6af40653c0a0be975232fb49bcbd021cfc36

      SHA512

      3493fa6334931c1e41e0e9d0621949c8bfd33c72811b3407e47c17fb55864a0710ae094bb0d547f19ec23d7626f04fe620ed478ada1d88e6647794063036388d

    • C:\Users.exe

      Filesize

      42KB

      MD5

      2ca8f9b37e3f1f866e02bc97c4f127de

      SHA1

      7cd87d287c99c80380314dba8ded88bdec5fb7f6

      SHA256

      ad680a8d6d0255577ef8e08f8d7ec161cb690a78bde1690fab2be746559fc50c

      SHA512

      051823749faf0045f611ef8694bff2b8070558f3d47fd95a7bdc76c1116fe5a4d1f8b47c8190f15270499c10a27d9005f44add9edc196fac71ffd1e3f2266579

    • memory/2060-0-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/2060-3-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/2060-7-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/2060-21-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/2060-59-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/2648-8-0x0000000003730000-0x0000000003731000-memory.dmp

      Filesize

      4KB

    • memory/2648-9-0x0000000003740000-0x0000000003750000-memory.dmp

      Filesize

      64KB

    • memory/2648-60-0x0000000003730000-0x0000000003731000-memory.dmp

      Filesize

      4KB