Analysis
-
max time kernel
148s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
21-10-2023 21:29
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.b3f2134f96f805f0689064040af619f0.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.b3f2134f96f805f0689064040af619f0.dll
Resource
win10v2004-20231020-en
General
-
Target
NEAS.b3f2134f96f805f0689064040af619f0.dll
-
Size
71KB
-
MD5
b3f2134f96f805f0689064040af619f0
-
SHA1
457c1a5b44efa85d83a274338587b3111f92a700
-
SHA256
be435e68230b757d9af29b505491ac9e690c9755e08e2bd6310059bc333436d2
-
SHA512
d6dcc502b75e607a5efe245d88abe63cda41bb6025780b66f0cbf7c637ea0afed22dd61e188f788a0d238fc924037b7fdf1b43c342ba39503b32400b780d6f27
-
SSDEEP
768:pdGvJuh5Zve0szqVzvM+SzdGHGv8x7NjoUIjCmca9Fuhcm19IGuVlugWIuzjL3dv:pchqZGzEMhMt+0a9ghrY2jR/oxq
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Unicode_Normalization\Parameters\ServiceDll = "C:\\Windows\\system32\\msvcrts.dll" rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1520 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\msvcrts.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\msvcrts.dll rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1140 wrote to memory of 292 1140 rundll32.exe 28 PID 1140 wrote to memory of 292 1140 rundll32.exe 28 PID 1140 wrote to memory of 292 1140 rundll32.exe 28 PID 1140 wrote to memory of 292 1140 rundll32.exe 28 PID 1140 wrote to memory of 292 1140 rundll32.exe 28 PID 1140 wrote to memory of 292 1140 rundll32.exe 28 PID 1140 wrote to memory of 292 1140 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.b3f2134f96f805f0689064040af619f0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.b3f2134f96f805f0689064040af619f0.dll,#12⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
PID:292
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5b3f2134f96f805f0689064040af619f0
SHA1457c1a5b44efa85d83a274338587b3111f92a700
SHA256be435e68230b757d9af29b505491ac9e690c9755e08e2bd6310059bc333436d2
SHA512d6dcc502b75e607a5efe245d88abe63cda41bb6025780b66f0cbf7c637ea0afed22dd61e188f788a0d238fc924037b7fdf1b43c342ba39503b32400b780d6f27
-
Filesize
71KB
MD5b3f2134f96f805f0689064040af619f0
SHA1457c1a5b44efa85d83a274338587b3111f92a700
SHA256be435e68230b757d9af29b505491ac9e690c9755e08e2bd6310059bc333436d2
SHA512d6dcc502b75e607a5efe245d88abe63cda41bb6025780b66f0cbf7c637ea0afed22dd61e188f788a0d238fc924037b7fdf1b43c342ba39503b32400b780d6f27