Analysis
-
max time kernel
151s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 21:38
Behavioral task
behavioral1
Sample
NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe
Resource
win7-20231020-en
General
-
Target
NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe
-
Size
454KB
-
MD5
fd30a8f2f2f4f84aaaef0fdea0cd2320
-
SHA1
567953cb0e5fd58920835fa1b3d229b4d947d7fb
-
SHA256
a6d49041c450a7211cdc9e209b2df8bfd0296b2433afddd35bc85e5dc40436b8
-
SHA512
0964c2b6f9573f8370af9b82d7e6be666920d458299506b44106ab03c53022471bf8f8de7750980e20d8d8e3122a897d1c6a1e4c7d550aa273e4a259ae8fc4c7
-
SSDEEP
12288:X6Wq4aaE6KwyF5L0Y2D1PqLb6Wq4aan6Wq4aaE6K8:1thEVaPqLBthFthE0
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" svhost.exe -
Executes dropped EXE 1 IoCs
pid Process 4412 svhost.exe -
resource yara_rule behavioral2/memory/3788-0-0x0000000000400000-0x0000000000523000-memory.dmp upx behavioral2/files/0x0008000000022e27-3.dat upx behavioral2/files/0x0008000000022e27-4.dat upx behavioral2/memory/4412-5-0x0000000000400000-0x0000000000523000-memory.dmp upx behavioral2/memory/3788-104-0x0000000000400000-0x0000000000523000-memory.dmp upx behavioral2/files/0x0006000000022e4d-106.dat upx behavioral2/memory/3788-119-0x0000000000400000-0x0000000000523000-memory.dmp upx behavioral2/memory/4412-130-0x0000000000400000-0x0000000000523000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\y: svhost.exe File opened (read-only) \??\a: svhost.exe File opened (read-only) \??\g: svhost.exe File opened (read-only) \??\h: svhost.exe File opened (read-only) \??\j: svhost.exe File opened (read-only) \??\s: svhost.exe File opened (read-only) \??\v: svhost.exe File opened (read-only) \??\i: svhost.exe File opened (read-only) \??\k: svhost.exe File opened (read-only) \??\l: svhost.exe File opened (read-only) \??\p: svhost.exe File opened (read-only) \??\q: svhost.exe File opened (read-only) \??\w: svhost.exe File opened (read-only) \??\e: svhost.exe File opened (read-only) \??\n: svhost.exe File opened (read-only) \??\t: svhost.exe File opened (read-only) \??\u: svhost.exe File opened (read-only) \??\x: svhost.exe File opened (read-only) \??\z: svhost.exe File opened (read-only) \??\b: svhost.exe File opened (read-only) \??\m: svhost.exe File opened (read-only) \??\o: svhost.exe File opened (read-only) \??\r: svhost.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3788-104-0x0000000000400000-0x0000000000523000-memory.dmp autoit_exe behavioral2/memory/3788-119-0x0000000000400000-0x0000000000523000-memory.dmp autoit_exe behavioral2/memory/4412-130-0x0000000000400000-0x0000000000523000-memory.dmp autoit_exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svhost.exe NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe File opened for modification C:\Windows\Driver.db svhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3788 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 3788 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4412 svhost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3788 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 3788 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 4412 svhost.exe 4412 svhost.exe 3788 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 4412 svhost.exe 3788 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 3788 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 3788 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 3788 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 3788 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 4412 svhost.exe 3788 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 3788 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3788 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 3788 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 4412 svhost.exe 4412 svhost.exe 3788 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 4412 svhost.exe 3788 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 3788 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 3788 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 3788 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 3788 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 4412 svhost.exe 3788 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 3788 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe 4412 svhost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3788 wrote to memory of 4412 3788 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 87 PID 3788 wrote to memory of 4412 3788 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 87 PID 3788 wrote to memory of 4412 3788 NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.fd30a8f2f2f4f84aaaef0fdea0cd2320.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\svhost.exeC:\Windows\svhost.exe2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82B
MD5c2d2dc50dca8a2bfdc8e2d59dfa5796d
SHA17a6150fc53244e28d1bcea437c0c9d276c41ccad
SHA256b2d38b3f122cfcf3cecabf0dfe2ab9c4182416d6961ae43f1eebee489cf3c960
SHA5126cfdd08729de9ee9d1f5d8fcd859144d32ddc0a9e7074202a7d03d3795bdf0027a074a6aa54f451d4166024c134b27c55c7142170e64d979d86c13801f937ce4
-
Filesize
454KB
MD5230b0730ced6ac251546255e964b9fac
SHA1007cbfd8801a7070debbd093907a04718a22468b
SHA256096732fec98509c729300c8fa9c7057ab1a92bebb42aab138eb4ffef73c7abc5
SHA5122e0b51c25e5e52e5fa31e97e840b627688f70743b091af46c9b96fc0048f63000ac8daa8a301c753fa0d6f8c5de5d0ffc86e19f2d50eef7e4a2d1a4b8a622d05
-
Filesize
454KB
MD5230b0730ced6ac251546255e964b9fac
SHA1007cbfd8801a7070debbd093907a04718a22468b
SHA256096732fec98509c729300c8fa9c7057ab1a92bebb42aab138eb4ffef73c7abc5
SHA5122e0b51c25e5e52e5fa31e97e840b627688f70743b091af46c9b96fc0048f63000ac8daa8a301c753fa0d6f8c5de5d0ffc86e19f2d50eef7e4a2d1a4b8a622d05
-
Filesize
454KB
MD5b312b40cec02a484454746a0cfb2db6b
SHA123369fa7cd55cc0a35d7c84ca3f2f0aadfd76520
SHA256ecd9119d24925ee17676d8b8ef2dbaed53281b5479426538303a7086807aa3d5
SHA5124bd6d6eb0f05f0ddc5157e76e137a138038cb72d597eb091fb5ff8e1b8b60b81f070fab47c57ec67e927a4b7ff854416937d8d1c60f58ca6a64d3dd455bacc21