Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
21-10-2023 21:27
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.9c9fb246c7333d0c651bf1793daf6320.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.9c9fb246c7333d0c651bf1793daf6320.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.9c9fb246c7333d0c651bf1793daf6320.exe
-
Size
1.8MB
-
MD5
9c9fb246c7333d0c651bf1793daf6320
-
SHA1
cd8b8ca9027e691e097b2cc58270b40f32e8b192
-
SHA256
018df3005c20d8636d870acf38bca290e659c7bfcb5f7f148b45506c956d25a7
-
SHA512
04a371242848ea789a4c7836d27a63bff49ce9f79139e7b53e950f7241552902216815d13bb2351566a9f25002427f6a1632c11215959bf12e129d2bcb39b283
-
SSDEEP
49152:nhP1SzU1w4YTBSxFrQB5jSBx/osk+y54s3aiywsglmCdakWnZrPqkiRK1a5J89tg:hozUZTeFt87YUQMu+i/
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2684 regsvr32.exe -
Modifies registry class 43 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27814197-307B-4ED8-BF3F-AE0A178F020A}\InprocServer32\ThreadingModel = "both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3759DFF2-9A3E-435D-8EE1-29B93B8F0DA2}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3759DFF2-9A3E-435D-8EE1-29B93B8F0DA2}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{68420D8D-7631-4A60-8A49-D938D2A8562D}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{68420D8D-7631-4A60-8A49-D938D2A8562D}\TypeLib\ = "{3759DFF2-9A3E-435D-8EE1-29B93B8F0DA2}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\// regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\//\// regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27814197-307B-4ED8-BF3F-AE0A178F020A}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{68420D8D-7631-4A60-8A49-D938D2A8562D}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{68420D8D-7631-4A60-8A49-D938D2A8562D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{68420D8D-7631-4A60-8A49-D938D2A8562D}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\haoi.dt\CLSID\ = "{27814197-307B-4ED8-BF3F-AE0A178F020A}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27814197-307B-4ED8-BF3F-AE0A178F020A}\ProgID\ = "haoi.dt" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3759DFF2-9A3E-435D-8EE1-29B93B8F0DA2}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{68420D8D-7631-4A60-8A49-D938D2A8562D}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27814197-307B-4ED8-BF3F-AE0A178F020A} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3759DFF2-9A3E-435D-8EE1-29B93B8F0DA2} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3759DFF2-9A3E-435D-8EE1-29B93B8F0DA2}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3759DFF2-9A3E-435D-8EE1-29B93B8F0DA2}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3759DFF2-9A3E-435D-8EE1-29B93B8F0DA2}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{68420D8D-7631-4A60-8A49-D938D2A8562D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{68420D8D-7631-4A60-8A49-D938D2A8562D}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\//\CurVer\ = "haoi.dt" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\//\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27814197-307B-4ED8-BF3F-AE0A178F020A}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{68420D8D-7631-4A60-8A49-D938D2A8562D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{68420D8D-7631-4A60-8A49-D938D2A8562D}\ = "Idt" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\//\CLSID\ = "{27814197-307B-4ED8-BF3F-AE0A178F020A}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27814197-307B-4ED8-BF3F-AE0A178F020A}\VersionIndependentProgID\ = "haoi.dt" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27814197-307B-4ED8-BF3F-AE0A178F020A}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haoi.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3759DFF2-9A3E-435D-8EE1-29B93B8F0DA2}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{68420D8D-7631-4A60-8A49-D938D2A8562D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27814197-307B-4ED8-BF3F-AE0A178F020A}\ = "dt Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27814197-307B-4ED8-BF3F-AE0A178F020A}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3759DFF2-9A3E-435D-8EE1-29B93B8F0DA2}\1.0\ = "haoi" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{68420D8D-7631-4A60-8A49-D938D2A8562D}\TypeLib\ = "{3759DFF2-9A3E-435D-8EE1-29B93B8F0DA2}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\haoi.dt regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\haoi.dt\ = "dt Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{68420D8D-7631-4A60-8A49-D938D2A8562D}\ = "Idt" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{68420D8D-7631-4A60-8A49-D938D2A8562D}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\haoi.dt\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\//\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3759DFF2-9A3E-435D-8EE1-29B93B8F0DA2}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haoi.dll" regsvr32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1380 NEAS.9c9fb246c7333d0c651bf1793daf6320.exe 1380 NEAS.9c9fb246c7333d0c651bf1793daf6320.exe 1380 NEAS.9c9fb246c7333d0c651bf1793daf6320.exe 1380 NEAS.9c9fb246c7333d0c651bf1793daf6320.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1380 wrote to memory of 2120 1380 NEAS.9c9fb246c7333d0c651bf1793daf6320.exe 28 PID 1380 wrote to memory of 2120 1380 NEAS.9c9fb246c7333d0c651bf1793daf6320.exe 28 PID 1380 wrote to memory of 2120 1380 NEAS.9c9fb246c7333d0c651bf1793daf6320.exe 28 PID 1380 wrote to memory of 2120 1380 NEAS.9c9fb246c7333d0c651bf1793daf6320.exe 28 PID 1380 wrote to memory of 2120 1380 NEAS.9c9fb246c7333d0c651bf1793daf6320.exe 28 PID 1380 wrote to memory of 2120 1380 NEAS.9c9fb246c7333d0c651bf1793daf6320.exe 28 PID 1380 wrote to memory of 2120 1380 NEAS.9c9fb246c7333d0c651bf1793daf6320.exe 28 PID 1380 wrote to memory of 2684 1380 NEAS.9c9fb246c7333d0c651bf1793daf6320.exe 29 PID 1380 wrote to memory of 2684 1380 NEAS.9c9fb246c7333d0c651bf1793daf6320.exe 29 PID 1380 wrote to memory of 2684 1380 NEAS.9c9fb246c7333d0c651bf1793daf6320.exe 29 PID 1380 wrote to memory of 2684 1380 NEAS.9c9fb246c7333d0c651bf1793daf6320.exe 29 PID 1380 wrote to memory of 2684 1380 NEAS.9c9fb246c7333d0c651bf1793daf6320.exe 29 PID 1380 wrote to memory of 2684 1380 NEAS.9c9fb246c7333d0c651bf1793daf6320.exe 29 PID 1380 wrote to memory of 2684 1380 NEAS.9c9fb246c7333d0c651bf1793daf6320.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.9c9fb246c7333d0c651bf1793daf6320.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.9c9fb246c7333d0c651bf1793daf6320.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s haoi.dll2⤵PID:2120
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s haoi.dll2⤵
- Loads dropped DLL
- Modifies registry class
PID:2684
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD5203cd4ec29a18f1c8a1ddefadc3f7382
SHA147a4072edf7c4530d4e86b84cbe5118e277de543
SHA256566086537066d3ff72167f09adc2522ac72d24da0601e7966367a8a85802a121
SHA51228fb3cf0d811f35c387bb666070ce5b6422401e59d0748e420c246efcf7f3ecbe6ee938242d7e93103083e9b45590abe0e864e540b953bd3c4f3949b3d579a19
-
Filesize
160KB
MD5203cd4ec29a18f1c8a1ddefadc3f7382
SHA147a4072edf7c4530d4e86b84cbe5118e277de543
SHA256566086537066d3ff72167f09adc2522ac72d24da0601e7966367a8a85802a121
SHA51228fb3cf0d811f35c387bb666070ce5b6422401e59d0748e420c246efcf7f3ecbe6ee938242d7e93103083e9b45590abe0e864e540b953bd3c4f3949b3d579a19