Analysis

  • max time kernel
    165s
  • max time network
    165s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    21/10/2023, 21:36

General

  • Target

    NEAS.eb6acfcc03fc92b855d643440ac349c0.exe

  • Size

    181KB

  • MD5

    eb6acfcc03fc92b855d643440ac349c0

  • SHA1

    e2fe73ff6205ae1bacd3f39119779f0ff03181ec

  • SHA256

    fe31c9679c6c55e2c1c8e6b82c7f2a7a7f44ef4d681bcd535c8b33a54e5561b6

  • SHA512

    7963f186e2cd4615efbbb1e103facf5b907befbb178e9cf8f0fa80b982f1ed19bacf385f81ec112a8d8e6c51c10f821f655af71131d0341c0b30b3c981880cbc

  • SSDEEP

    3072:o8JVgPzQ8pO6ORW79Yy8Ei/Q7i8PNo78h6Di/rXT00X19POy/w7/15TSIAG:PmzQ8pMk6cn+mF//19POyox5TSI

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:428
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1220
      • C:\Users\Admin\AppData\Local\Temp\NEAS.eb6acfcc03fc92b855d643440ac349c0.exe
        "C:\Users\Admin\AppData\Local\Temp\NEAS.eb6acfcc03fc92b855d643440ac349c0.exe"
        2⤵
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2624
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\NEAS.eb6acfcc03fc92b855d643440ac349c0.exe"
          3⤵
          • Deletes itself
          • Suspicious use of WriteProcessMemory
          PID:2052
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 1
            4⤵
            • Delays execution with timeout.exe
            PID:1728
      • C:\ProgramData\StikyNot.exe
        "C:\ProgramData\StikyNot.exe"
        2⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2856

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\StikyNot.exe

      Filesize

      417KB

      MD5

      b22cb67919ebad88b0e8bb9cda446010

      SHA1

      423a794d26d96d9f812d76d75fa89bffdc07d468

      SHA256

      2f744feac48ede7d6b6d2727f7ddfa80b26d9e3b0009741b00992b19ad85e128

      SHA512

      f40aad2a381b766aae0a353fae3ab759d5c536b2d00d135527bba37b601d2f24323f079bd09600355d79404d574ac59201d415ef64c1568877ad0ce0da2dd1d5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      46e91f30467a7e1dd045289c725a53bc

      SHA1

      35e088dc3fa7d8b8d449707bbc13656be7eb506a

      SHA256

      4b8b22b58241f105cedba9300dc2b4ffe835ef6df1bed467a1bdac0526241ab5

      SHA512

      067cf663fc3abf359746673238174020d3368d84a34d75f3a36dcb66cc12f1ffb83f650524f5170358f67ae716d70e04fb562118f52b7086efd00082a01cba1a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0be599ca66089c1ebb18d0fa03790de2

      SHA1

      ed68cad87959bb9a7ced7ee13ca1db05dd1d821b

      SHA256

      cc9979286533ec2c354a5cbd109db3c70978703ae1336f48b7f2ca8b34660e0b

      SHA512

      b01946decade6a088e69b7c66f8cd0a5537808073eee67daa501b144e5d45712e4b0c86fb62acaaa1d8f543d538de26f9c8602376ebe8b6432d13e88bbfd4c73

    • C:\Users\Admin\AppData\Local\Temp\CabD9FC.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\Tar1298.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • \ProgramData\StikyNot.exe

      Filesize

      417KB

      MD5

      b22cb67919ebad88b0e8bb9cda446010

      SHA1

      423a794d26d96d9f812d76d75fa89bffdc07d468

      SHA256

      2f744feac48ede7d6b6d2727f7ddfa80b26d9e3b0009741b00992b19ad85e128

      SHA512

      f40aad2a381b766aae0a353fae3ab759d5c536b2d00d135527bba37b601d2f24323f079bd09600355d79404d574ac59201d415ef64c1568877ad0ce0da2dd1d5

    • memory/428-111-0x00000000008F0000-0x0000000000918000-memory.dmp

      Filesize

      160KB

    • memory/428-49-0x00000000008F0000-0x0000000000918000-memory.dmp

      Filesize

      160KB

    • memory/428-47-0x0000000000860000-0x0000000000863000-memory.dmp

      Filesize

      12KB

    • memory/1220-140-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-144-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-157-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-158-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-24-0x0000000006520000-0x0000000006617000-memory.dmp

      Filesize

      988KB

    • memory/1220-156-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-155-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-154-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-153-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-125-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-21-0x0000000002A90000-0x0000000002A93000-memory.dmp

      Filesize

      12KB

    • memory/1220-152-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-20-0x0000000002A90000-0x0000000002A93000-memory.dmp

      Filesize

      12KB

    • memory/1220-151-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-150-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-90-0x0000000006520000-0x0000000006617000-memory.dmp

      Filesize

      988KB

    • memory/1220-149-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-148-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-147-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-146-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-145-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-127-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-143-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-142-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-141-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-139-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-138-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-137-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-136-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-135-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-134-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-133-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-132-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-122-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-123-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-130-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-131-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-126-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-23-0x0000000002A90000-0x0000000002A93000-memory.dmp

      Filesize

      12KB

    • memory/1220-129-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1220-124-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/2624-113-0x0000000000350000-0x00000000003BC000-memory.dmp

      Filesize

      432KB

    • memory/2624-50-0x0000000000350000-0x00000000003BC000-memory.dmp

      Filesize

      432KB

    • memory/2624-3-0x0000000000350000-0x00000000003BC000-memory.dmp

      Filesize

      432KB

    • memory/2624-2-0x0000000000350000-0x00000000003BC000-memory.dmp

      Filesize

      432KB

    • memory/2624-1-0x0000000000350000-0x00000000003BC000-memory.dmp

      Filesize

      432KB

    • memory/2624-0-0x0000000000350000-0x00000000003BC000-memory.dmp

      Filesize

      432KB

    • memory/2856-107-0x0000000002160000-0x0000000002161000-memory.dmp

      Filesize

      4KB

    • memory/2856-91-0x00000000008F0000-0x0000000000918000-memory.dmp

      Filesize

      160KB

    • memory/2856-114-0x0000000002170000-0x000000000217F000-memory.dmp

      Filesize

      60KB

    • memory/2856-116-0x0000000002E70000-0x0000000002F10000-memory.dmp

      Filesize

      640KB

    • memory/2856-117-0x0000000002160000-0x0000000002161000-memory.dmp

      Filesize

      4KB

    • memory/2856-112-0x0000000002160000-0x0000000002161000-memory.dmp

      Filesize

      4KB

    • memory/2856-118-0x0000000002170000-0x000000000217F000-memory.dmp

      Filesize

      60KB

    • memory/2856-110-0x0000000002160000-0x0000000002161000-memory.dmp

      Filesize

      4KB

    • memory/2856-109-0x0000000002160000-0x0000000002161000-memory.dmp

      Filesize

      4KB

    • memory/2856-28-0x0000000000170000-0x0000000000233000-memory.dmp

      Filesize

      780KB

    • memory/2856-119-0x0000000002E70000-0x0000000002F10000-memory.dmp

      Filesize

      640KB

    • memory/2856-108-0x0000000001D40000-0x0000000001E0B000-memory.dmp

      Filesize

      812KB

    • memory/2856-93-0x0000000001D40000-0x0000000001E0B000-memory.dmp

      Filesize

      812KB

    • memory/2856-115-0x0000000002E70000-0x0000000002F10000-memory.dmp

      Filesize

      640KB

    • memory/2856-88-0x0000000036D10000-0x0000000036D20000-memory.dmp

      Filesize

      64KB

    • memory/2856-120-0x0000000002160000-0x0000000002165000-memory.dmp

      Filesize

      20KB

    • memory/2856-128-0x0000000002290000-0x00000000022A0000-memory.dmp

      Filesize

      64KB

    • memory/2856-45-0x000007FEBECF0000-0x000007FEBED00000-memory.dmp

      Filesize

      64KB

    • memory/2856-44-0x0000000001D40000-0x0000000001E0B000-memory.dmp

      Filesize

      812KB

    • memory/2856-42-0x0000000001D40000-0x0000000001E0B000-memory.dmp

      Filesize

      812KB

    • memory/2856-40-0x0000000000090000-0x0000000000093000-memory.dmp

      Filesize

      12KB

    • memory/2856-36-0x0000000000090000-0x0000000000093000-memory.dmp

      Filesize

      12KB

    • memory/2856-30-0x0000000000060000-0x0000000000061000-memory.dmp

      Filesize

      4KB

    • memory/2856-172-0x0000000002E70000-0x0000000002F10000-memory.dmp

      Filesize

      640KB

    • memory/2856-174-0x0000000002160000-0x0000000002161000-memory.dmp

      Filesize

      4KB

    • memory/2856-173-0x0000000002E70000-0x0000000002F10000-memory.dmp

      Filesize

      640KB