Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16/10/2023, 18:19
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.46be92b92281850d820da42375e43570.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.46be92b92281850d820da42375e43570.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.46be92b92281850d820da42375e43570.exe
-
Size
533KB
-
MD5
46be92b92281850d820da42375e43570
-
SHA1
0320639d6d1ee1bebaba913323bf78a1747ec492
-
SHA256
15273ffc9bfa7a9b492c9b5bfa810db2fed1fe4a771f340017a3c84f702bc18a
-
SHA512
097c5194edd90bc994330379698a90429946dd0b42225388181910731e194ec1aa51540037e60229e2b040e7c14465a390629e8e902fdb5a7ef6b23325b2f539
-
SSDEEP
12288:nMrzy90bOenEo7jPBFi2IZNe3/qZ0Cs1ff3:My8OeB7jpFi2zyGRdP
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
Executes dropped EXE 1 IoCs
pid Process 2100 1uB60cm5.exe -
Loads dropped DLL 6 IoCs
pid Process 2956 NEAS.46be92b92281850d820da42375e43570.exe 2100 1uB60cm5.exe 1768 WerFault.exe 1768 WerFault.exe 1768 WerFault.exe 1768 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.46be92b92281850d820da42375e43570.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2100 set thread context of 1012 2100 1uB60cm5.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 1768 2100 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1012 AppLaunch.exe 1012 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1012 AppLaunch.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2100 2956 NEAS.46be92b92281850d820da42375e43570.exe 28 PID 2956 wrote to memory of 2100 2956 NEAS.46be92b92281850d820da42375e43570.exe 28 PID 2956 wrote to memory of 2100 2956 NEAS.46be92b92281850d820da42375e43570.exe 28 PID 2956 wrote to memory of 2100 2956 NEAS.46be92b92281850d820da42375e43570.exe 28 PID 2956 wrote to memory of 2100 2956 NEAS.46be92b92281850d820da42375e43570.exe 28 PID 2956 wrote to memory of 2100 2956 NEAS.46be92b92281850d820da42375e43570.exe 28 PID 2956 wrote to memory of 2100 2956 NEAS.46be92b92281850d820da42375e43570.exe 28 PID 2100 wrote to memory of 2216 2100 1uB60cm5.exe 29 PID 2100 wrote to memory of 2216 2100 1uB60cm5.exe 29 PID 2100 wrote to memory of 2216 2100 1uB60cm5.exe 29 PID 2100 wrote to memory of 2216 2100 1uB60cm5.exe 29 PID 2100 wrote to memory of 2216 2100 1uB60cm5.exe 29 PID 2100 wrote to memory of 2216 2100 1uB60cm5.exe 29 PID 2100 wrote to memory of 2216 2100 1uB60cm5.exe 29 PID 2100 wrote to memory of 1012 2100 1uB60cm5.exe 30 PID 2100 wrote to memory of 1012 2100 1uB60cm5.exe 30 PID 2100 wrote to memory of 1012 2100 1uB60cm5.exe 30 PID 2100 wrote to memory of 1012 2100 1uB60cm5.exe 30 PID 2100 wrote to memory of 1012 2100 1uB60cm5.exe 30 PID 2100 wrote to memory of 1012 2100 1uB60cm5.exe 30 PID 2100 wrote to memory of 1012 2100 1uB60cm5.exe 30 PID 2100 wrote to memory of 1012 2100 1uB60cm5.exe 30 PID 2100 wrote to memory of 1012 2100 1uB60cm5.exe 30 PID 2100 wrote to memory of 1012 2100 1uB60cm5.exe 30 PID 2100 wrote to memory of 1012 2100 1uB60cm5.exe 30 PID 2100 wrote to memory of 1012 2100 1uB60cm5.exe 30 PID 2100 wrote to memory of 1768 2100 1uB60cm5.exe 31 PID 2100 wrote to memory of 1768 2100 1uB60cm5.exe 31 PID 2100 wrote to memory of 1768 2100 1uB60cm5.exe 31 PID 2100 wrote to memory of 1768 2100 1uB60cm5.exe 31 PID 2100 wrote to memory of 1768 2100 1uB60cm5.exe 31 PID 2100 wrote to memory of 1768 2100 1uB60cm5.exe 31 PID 2100 wrote to memory of 1768 2100 1uB60cm5.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.46be92b92281850d820da42375e43570.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.46be92b92281850d820da42375e43570.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1uB60cm5.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1uB60cm5.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:2216
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 2803⤵
- Loads dropped DLL
- Program crash
PID:1768
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81