Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
21/10/2023, 21:38
Behavioral task
behavioral1
Sample
NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe
Resource
win7-20231020-en
General
-
Target
NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe
-
Size
454KB
-
MD5
fd30a8f2f2f4f84aaaef0fdea0cd2320
-
SHA1
567953cb0e5fd58920835fa1b3d229b4d947d7fb
-
SHA256
a6d49041c450a7211cdc9e209b2df8bfd0296b2433afddd35bc85e5dc40436b8
-
SHA512
0964c2b6f9573f8370af9b82d7e6be666920d458299506b44106ab03c53022471bf8f8de7750980e20d8d8e3122a897d1c6a1e4c7d550aa273e4a259ae8fc4c7
-
SSDEEP
12288:X6Wq4aaE6KwyF5L0Y2D1PqLb6Wq4aan6Wq4aaE6K8:1thEVaPqLBthFthE0
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3986878123-1347213090-2173403696-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" svhost.exe -
Executes dropped EXE 1 IoCs
pid Process 2288 svhost.exe -
resource yara_rule behavioral1/memory/2656-0-0x0000000000400000-0x0000000000523000-memory.dmp upx behavioral1/files/0x000900000001226b-4.dat upx behavioral1/files/0x000900000001226b-5.dat upx behavioral1/files/0x0007000000016060-65.dat upx behavioral1/memory/2656-424-0x0000000000400000-0x0000000000523000-memory.dmp upx behavioral1/memory/2288-1078-0x0000000000400000-0x0000000000523000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\b: svhost.exe File opened (read-only) \??\e: svhost.exe File opened (read-only) \??\g: svhost.exe File opened (read-only) \??\h: svhost.exe File opened (read-only) \??\q: svhost.exe File opened (read-only) \??\w: svhost.exe File opened (read-only) \??\i: svhost.exe File opened (read-only) \??\p: svhost.exe File opened (read-only) \??\t: svhost.exe File opened (read-only) \??\v: svhost.exe File opened (read-only) \??\y: svhost.exe File opened (read-only) \??\z: svhost.exe File opened (read-only) \??\a: svhost.exe File opened (read-only) \??\j: svhost.exe File opened (read-only) \??\k: svhost.exe File opened (read-only) \??\l: svhost.exe File opened (read-only) \??\x: svhost.exe File opened (read-only) \??\m: svhost.exe File opened (read-only) \??\n: svhost.exe File opened (read-only) \??\o: svhost.exe File opened (read-only) \??\r: svhost.exe File opened (read-only) \??\s: svhost.exe File opened (read-only) \??\u: svhost.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2656-424-0x0000000000400000-0x0000000000523000-memory.dmp autoit_exe behavioral1/memory/2288-1078-0x0000000000400000-0x0000000000523000-memory.dmp autoit_exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svhost.exe NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe File opened for modification C:\Windows\Driver.db svhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2656 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2288 svhost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2656 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 2656 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 2288 svhost.exe 2288 svhost.exe 2656 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 2288 svhost.exe 2656 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 2288 svhost.exe 2656 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 2288 svhost.exe 2656 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 2288 svhost.exe 2656 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 2288 svhost.exe 2656 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2656 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 2656 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 2288 svhost.exe 2288 svhost.exe 2656 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 2288 svhost.exe 2656 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 2288 svhost.exe 2656 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 2288 svhost.exe 2656 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 2288 svhost.exe 2656 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 2288 svhost.exe 2656 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe 2288 svhost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2288 2656 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 28 PID 2656 wrote to memory of 2288 2656 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 28 PID 2656 wrote to memory of 2288 2656 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 28 PID 2656 wrote to memory of 2288 2656 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\svhost.exeC:\Windows\svhost.exe2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
454KB
MD5bc516b6fb6a5876c7f0ccbb192edb536
SHA1764bda3449fd3d4f344dc023908c21d8f46b3ac6
SHA256916c15be74c244bb9a4a99fb52bdad72368ae0f0dba2a5597e1c8aa63b088db7
SHA512743594bbbe0da16acb0b0e87153ea4d8735f9cadeb1986afd27b5cb6b45ee2144c843b36830138a944d2bb955f79f890c6a8d1cf315b0cce14a1380b616c4f2d
-
Filesize
82B
MD5c2d2dc50dca8a2bfdc8e2d59dfa5796d
SHA17a6150fc53244e28d1bcea437c0c9d276c41ccad
SHA256b2d38b3f122cfcf3cecabf0dfe2ab9c4182416d6961ae43f1eebee489cf3c960
SHA5126cfdd08729de9ee9d1f5d8fcd859144d32ddc0a9e7074202a7d03d3795bdf0027a074a6aa54f451d4166024c134b27c55c7142170e64d979d86c13801f937ce4
-
Filesize
454KB
MD57dc53581a7f534428601fb5f84f82ca8
SHA1e29ecb81a0bf82ca3d2b4cd11fd7d213bad19218
SHA256b024574a001eac7f567a6ff5a59e240ab6e83bebcc1da66dd7e7d4a805e8a5e0
SHA5129ee67973df8941ea2ebe32e05ddcf65f85f1daf0ad39b7bf54ddbeb84c7955e4101258be33386a69d402f74cf89b84e72083d52de1419d0862c87d0ae4d99e90
-
Filesize
454KB
MD57dc53581a7f534428601fb5f84f82ca8
SHA1e29ecb81a0bf82ca3d2b4cd11fd7d213bad19218
SHA256b024574a001eac7f567a6ff5a59e240ab6e83bebcc1da66dd7e7d4a805e8a5e0
SHA5129ee67973df8941ea2ebe32e05ddcf65f85f1daf0ad39b7bf54ddbeb84c7955e4101258be33386a69d402f74cf89b84e72083d52de1419d0862c87d0ae4d99e90