Analysis
-
max time kernel
165s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
21/10/2023, 21:36
Behavioral task
behavioral1
Sample
NEAS.eb6acfcc03fc92b855d643440ac349c0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.eb6acfcc03fc92b855d643440ac349c0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.eb6acfcc03fc92b855d643440ac349c0.exe
-
Size
181KB
-
MD5
eb6acfcc03fc92b855d643440ac349c0
-
SHA1
e2fe73ff6205ae1bacd3f39119779f0ff03181ec
-
SHA256
fe31c9679c6c55e2c1c8e6b82c7f2a7a7f44ef4d681bcd535c8b33a54e5561b6
-
SHA512
7963f186e2cd4615efbbb1e103facf5b907befbb178e9cf8f0fa80b982f1ed19bacf385f81ec112a8d8e6c51c10f821f655af71131d0341c0b30b3c981880cbc
-
SSDEEP
3072:o8JVgPzQ8pO6ORW79Yy8Ei/Q7i8PNo78h6Di/rXT00X19POy/w7/15TSIAG:PmzQ8pMk6cn+mF//19POyox5TSI
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\yQHcoJTr.sys StikyNot.exe -
Deletes itself 1 IoCs
pid Process 2052 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2856 StikyNot.exe -
Loads dropped DLL 1 IoCs
pid Process 1220 Explorer.EXE -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\ \Windows\System32\g05Xoi.sys StikyNot.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\u6KjkSJIe.sys StikyNot.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 1728 timeout.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3986878123-1347213090-2173403696-1000\Software\Microsoft\Internet Explorer\New Windows\Allow StikyNot.exe Set value (data) \REGISTRY\USER\S-1-5-21-3986878123-1347213090-2173403696-1000\Software\Microsoft\Internet Explorer\New Windows\Allow\www.hao774.com StikyNot.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 StikyNot.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 04000000010000001000000079e4a9840d7d3a96d7c04fe2434c892e0f0000000100000014000000b34ddd372ed92e8f2abfbb9e20a9d31f204f194b090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000003de503556d14cbb66f0a3e21b1bc397b23dd1550b00000001000000120000004400690067006900430065007200740000001d000000010000001000000059779e39e21a2e3dfced6857ed5c5fd9030000000100000014000000a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c54361900000001000000100000000f3a0527d242de2dc98e5cfcb1e991ee2000000001000000b3030000308203af30820297a0030201020210083be056904246b1a1756ac95991c74a300d06092a864886f70d01010505003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e23be11172dea8a4d3a357aa50a28f0b7790c9a2a5ee12ce965b010920cc0193a74e30b753f743c46900579de28d22dd870640008109cece1b83bfdfcd3b7146e2d666c705b37627168f7b9e1e957deeb748a308dad6af7a0c3906657f4a5d1fbc17f8abbeee28d7747f7a78995985686e5c23324bbf4ec0e85a6de370bf7710bffc01f685d9a844105832a97518d5d1a2be47e2276af49a33f84908608bd45fb43a84bfa1aa4a4c7d3ecf4f5f6c765ea04b37919edc22e66dce141a8e6acbfecdb3146417c75b299e32bff2eefad30b42d4abb74132da0cd4eff881d5bb8d583fb51be84928a270da3104ddf7b216f24c0a4e07a8ed4a3d5eb57fa390c3af270203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041403de503556d14cbb66f0a3e21b1bc397b23dd155301f0603551d2304183016801403de503556d14cbb66f0a3e21b1bc397b23dd155300d06092a864886f70d01010505000382010100cb9c37aa4813120afadd449c4f52b0f4dfae04f5797908a32418fc4b2b84c02db9d5c7fef4c11f58cbb86d9c7a74e79829ab11b5e370a0a1cd4c8899938c9170e2ab0f1cbe93a9ff63d5e40760d3a3bf9d5b09f1d58ee353f48e63fa3fa7dbb466df6266d6d16e418df22db5ea774a9f9d58e22b59c04023ed2d2882453e7954922698e08048a837eff0d6796016deace80ecd6eac4417382f49dae1453e2ab93653cf3a5006f72ee8c457496c612118d504ad783c2c3a806ba7ebaf1514e9d889c1b9386ce2916c8aff64b977255730c01b24a3e1dce9df477cb5b424080530ec2dbd0bbf45bf50b9a9f3eb980112adc888c698345f8d0a3cc6e9d595956dde StikyNot.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2624 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe 2624 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe 2624 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe 2624 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe 2624 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 2624 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1220 Explorer.EXE -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 472 Process not Found 472 Process not Found 472 Process not Found -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2624 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe Token: SeTcbPrivilege 2624 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe Token: SeDebugPrivilege 2624 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe Token: SeDebugPrivilege 1220 Explorer.EXE Token: SeDebugPrivilege 1220 Explorer.EXE Token: SeDebugPrivilege 2624 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe Token: SeDebugPrivilege 2856 StikyNot.exe Token: SeDebugPrivilege 2856 StikyNot.exe Token: SeDebugPrivilege 2856 StikyNot.exe Token: SeIncBasePriorityPrivilege 2624 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe Token: SeDebugPrivilege 2856 StikyNot.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1220 Explorer.EXE 1220 Explorer.EXE 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe 2856 StikyNot.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1220 Explorer.EXE 1220 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2856 StikyNot.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2624 wrote to memory of 1220 2624 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe 21 PID 2624 wrote to memory of 1220 2624 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe 21 PID 2624 wrote to memory of 1220 2624 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe 21 PID 2624 wrote to memory of 1220 2624 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe 21 PID 2624 wrote to memory of 1220 2624 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe 21 PID 1220 wrote to memory of 2856 1220 Explorer.EXE 30 PID 1220 wrote to memory of 2856 1220 Explorer.EXE 30 PID 1220 wrote to memory of 2856 1220 Explorer.EXE 30 PID 1220 wrote to memory of 2856 1220 Explorer.EXE 30 PID 1220 wrote to memory of 2856 1220 Explorer.EXE 30 PID 1220 wrote to memory of 2856 1220 Explorer.EXE 30 PID 1220 wrote to memory of 2856 1220 Explorer.EXE 30 PID 1220 wrote to memory of 2856 1220 Explorer.EXE 30 PID 2624 wrote to memory of 428 2624 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe 3 PID 2624 wrote to memory of 428 2624 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe 3 PID 2624 wrote to memory of 428 2624 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe 3 PID 2624 wrote to memory of 428 2624 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe 3 PID 2624 wrote to memory of 428 2624 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe 3 PID 2624 wrote to memory of 2052 2624 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe 33 PID 2624 wrote to memory of 2052 2624 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe 33 PID 2624 wrote to memory of 2052 2624 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe 33 PID 2624 wrote to memory of 2052 2624 NEAS.eb6acfcc03fc92b855d643440ac349c0.exe 33 PID 2052 wrote to memory of 1728 2052 cmd.exe 35 PID 2052 wrote to memory of 1728 2052 cmd.exe 35 PID 2052 wrote to memory of 1728 2052 cmd.exe 35 PID 2052 wrote to memory of 1728 2052 cmd.exe 35 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21 PID 2856 wrote to memory of 1220 2856 StikyNot.exe 21
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:428
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\NEAS.eb6acfcc03fc92b855d643440ac349c0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.eb6acfcc03fc92b855d643440ac349c0.exe"2⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\NEAS.eb6acfcc03fc92b855d643440ac349c0.exe"3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\timeout.exetimeout /t 14⤵
- Delays execution with timeout.exe
PID:1728
-
-
-
-
C:\ProgramData\StikyNot.exe"C:\ProgramData\StikyNot.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
417KB
MD5b22cb67919ebad88b0e8bb9cda446010
SHA1423a794d26d96d9f812d76d75fa89bffdc07d468
SHA2562f744feac48ede7d6b6d2727f7ddfa80b26d9e3b0009741b00992b19ad85e128
SHA512f40aad2a381b766aae0a353fae3ab759d5c536b2d00d135527bba37b601d2f24323f079bd09600355d79404d574ac59201d415ef64c1568877ad0ce0da2dd1d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546e91f30467a7e1dd045289c725a53bc
SHA135e088dc3fa7d8b8d449707bbc13656be7eb506a
SHA2564b8b22b58241f105cedba9300dc2b4ffe835ef6df1bed467a1bdac0526241ab5
SHA512067cf663fc3abf359746673238174020d3368d84a34d75f3a36dcb66cc12f1ffb83f650524f5170358f67ae716d70e04fb562118f52b7086efd00082a01cba1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50be599ca66089c1ebb18d0fa03790de2
SHA1ed68cad87959bb9a7ced7ee13ca1db05dd1d821b
SHA256cc9979286533ec2c354a5cbd109db3c70978703ae1336f48b7f2ca8b34660e0b
SHA512b01946decade6a088e69b7c66f8cd0a5537808073eee67daa501b144e5d45712e4b0c86fb62acaaa1d8f543d538de26f9c8602376ebe8b6432d13e88bbfd4c73
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
417KB
MD5b22cb67919ebad88b0e8bb9cda446010
SHA1423a794d26d96d9f812d76d75fa89bffdc07d468
SHA2562f744feac48ede7d6b6d2727f7ddfa80b26d9e3b0009741b00992b19ad85e128
SHA512f40aad2a381b766aae0a353fae3ab759d5c536b2d00d135527bba37b601d2f24323f079bd09600355d79404d574ac59201d415ef64c1568877ad0ce0da2dd1d5