Analysis
-
max time kernel
151s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
21/10/2023, 17:27
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.3b495c04681d666a5e12a7f5a82d0287_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.3b495c04681d666a5e12a7f5a82d0287_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.3b495c04681d666a5e12a7f5a82d0287_JC.exe
-
Size
212KB
-
MD5
3b495c04681d666a5e12a7f5a82d0287
-
SHA1
a14b284e44c60a5dd9e310d41c1d0d35e94b3389
-
SHA256
601dd6264dca017c43b8acf71ca982a404317a8a5e1ff4981807a73230154113
-
SHA512
4e51c6678c2f4242919fab3eb67d1392fb4776792b86d564b650024438b3cad2cae2d3f93d25e5339bf9f6b3969eb44f597cf22b79f58e40fde6e7055e9dd833
-
SSDEEP
3072:lXi+1IfIwFs7ZbxrAerbWu7s3BLbOyYkW8/1HSG9VRfqXlzcM8tKog8vCa30+Z:lXMwwW7Z1rAeXT8bOcdHd9yrpoBv8+
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2120 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2096 NEAS.3b495c04681d666a5e12a7f5a82d0287_JC.exe 2096 NEAS.3b495c04681d666a5e12a7f5a82d0287_JC.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\bfde38dd = "M\x04Ó*\vÙÂ@ø!ñ,\v\x12ÂD‹\u00a0—\x0e…[L—\x1a^ªÑÃÛ\u008fÚ\x02\x1fZçO\x02žÏ\x02\rââß\v¦\x7f†-?\x03¿Ö½íë\x7f\x7fêbZâ³Ê×5î\x13?â\u008fê…\x0e\x17zÏ^âýŸ\x1eZ+ë½{\aµ+Ÿ:\x03§n\x7f'}'â\x0f•«\aMJ¢*f•òÇ\x15O[ÏzZ\u008f«m'ê²¢÷\x17j\x16&\r¶3\x16’Ç_žý«Z\x03϶¢?\u00adV&;Wÿ\u009d†ÿîR¿¥\x1f\x1ffÍún\x1awÒþ¾ŸÂïÞ¥G¶nÇ}¯o2&Þ\x17‹¶O^%['j\x06–Ç^?ÿ\u008doÇ\x05‚\r§vCÕr·ÞÒR\rî¢Eš\u008f7ZZÛ_…UÂÇú3톇å\x13ÏËWªîÖMZ~µŸÒo\x16îŽ\nêžÓWö" NEAS.3b495c04681d666a5e12a7f5a82d0287_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\bfde38dd = "M\x04Ó*\vÙÂ@ø!ñ,\v\x12ÂD‹\u00a0—\x0e…[L—\x1a^ªÑÃÛ\u008fÚ\x02\x1fZçO\x02žÏ\x02\rââß\v¦\x7f†-?\x03¿Ö½íë\x7f\x7fêbZâ³Ê×5î\x13?â\u008fê…\x0e\x17zÏ^âýŸ\x1eZ+ë½{\aµ+Ÿ:\x03§n\x7f'}'â\x0f•«\aMJ¢*f•òÇ\x15O[ÏzZ\u008f«m'ê²¢÷\x17j\x16&\r¶3\x16’Ç_žý«Z\x03϶¢?\u00adV&;Wÿ\u009d†ÿîR¿¥\x1f\x1ffÍún\x1awÒþ¾ŸÂïÞ¥G¶nÇ}¯o2&Þ\x17‹¶O^%['j\x06–Ç^?ÿ\u008doÇ\x05‚\r§vCÕr·ÞÒR\rî¢Eš\u008f7ZZÛ_…UÂÇú3톇å\x13ÏËWªîÖMZ~µŸÒo\x16îŽ\nêžÓWö" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe NEAS.3b495c04681d666a5e12a7f5a82d0287_JC.exe File opened for modification C:\Windows\apppatch\svchost.exe NEAS.3b495c04681d666a5e12a7f5a82d0287_JC.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2096 NEAS.3b495c04681d666a5e12a7f5a82d0287_JC.exe 2096 NEAS.3b495c04681d666a5e12a7f5a82d0287_JC.exe 2096 NEAS.3b495c04681d666a5e12a7f5a82d0287_JC.exe 2096 NEAS.3b495c04681d666a5e12a7f5a82d0287_JC.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe 2120 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2096 NEAS.3b495c04681d666a5e12a7f5a82d0287_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2120 2096 NEAS.3b495c04681d666a5e12a7f5a82d0287_JC.exe 28 PID 2096 wrote to memory of 2120 2096 NEAS.3b495c04681d666a5e12a7f5a82d0287_JC.exe 28 PID 2096 wrote to memory of 2120 2096 NEAS.3b495c04681d666a5e12a7f5a82d0287_JC.exe 28 PID 2096 wrote to memory of 2120 2096 NEAS.3b495c04681d666a5e12a7f5a82d0287_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.3b495c04681d666a5e12a7f5a82d0287_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.3b495c04681d666a5e12a7f5a82d0287_JC.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e16830c93bb22d67bfefcf1f5023a8c2
SHA1f8e855cab42d44be80fcf291412e8c061558bef2
SHA25642164e4284d5e6ced1f6d68a7a334c82bb7ad3b75c20512ab23758fe98d1b672
SHA512cc932a17c41484c083b6d4038efb65b0bd181c00f50b578d4dbf0a578747ab1be588c65abc23e2f06d5c61b02b196101f14ce60f907cd6a3465be87ee689b2f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53e72d9fc08d804d0f9518d22360c69b4
SHA14784e88ae9ed3bdda9c90e37d3b81bc42eaad5cb
SHA256ccad01243df12f67375e383fd496a44a9fb05cf88cc7c18e4c9d5611ceb9c7cf
SHA5129ac707960246eb84e2dd6f56590c9b5cfe8d9d64a53b3f4fe24a02b52eea037d6a305c3c9129741ef5bdbebe959a84e90976d0dc4ec6f22e3db35466374725e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55aa359b2516858ff57bc00508a85b3d3
SHA19ff84975fe2234de0eaa745382a3b73b137db9ac
SHA256017264e0ce6ce51d15eb5004da1dfcf5cbf352409dd27281891dd95f31cfd8d5
SHA5127c4467cefd83a7ac70227c47072cfde4b3ad67d43262962f78d86acee8669ba61d37468b4c85e86e6883f1a0728327ec39a9198dfaa4b8490b792d4c0276ba14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54f0e9ad06455e11f17cc9a4c384bbffc
SHA1da562f1f941456bb8875a91f52bdca159f284597
SHA256dfea5106f2849bda21ab28112092451c06fc7e265b075f4116e628018b4b306e
SHA51244040b387b88fb5046cf2bbce42ef79143f715a819095b6792f458c4c56741d592725b0c41eab1eab9053f26eb0fa664d9b8c53a97ed26b43c04b029171abc93
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
2KB
MD5d5063dd488c931953102950f90f660bf
SHA1acaa77325b5257470621ea595c5e571e5ed6e6c3
SHA256e05931fc8bed29c679b58da6ede484ffa498574af51d4bf283366e0722d48eb7
SHA512cea6cfbb6e42d8a1a578f2c99dfa9e48e6ab62d6bff06e3f9a7c426e112268795b406bb86ef24c3cfb258612b5d10031112ae3d6c2ed46057257155c32f6e2f7
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
1KB
MD5d4776245d86630b6baa916c40597eba2
SHA1e5675b01ae79e79cdb33dcaf656fae7b11f1c039
SHA2568d820718b89814efb1bdce655cac0b9ef5fa1746746a0602537c540bd2862af7
SHA51240c1fa448023123c3051923d798eab6977b25fa1d500af672add5e7756bb6d673965f31d3509f199ac4661dbaf35d55591fd955137554327f71c903abb772282
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
212KB
MD58ca618969ac4812adc5fa667e2abf8a9
SHA1bd78273277467e95bed317d08c29618375a9b6e1
SHA2568dde8ae7557e944b284aa7aa7552e50bf8330ac57b5a5883252747911623d918
SHA5124a3c8f72d9f6f504771e292cbaf9ea23411200c6c5b757d88f10ff33a07e3c3c2d53765c23fae0117968abf65a66793482a6fe29b443948d50549d38b69a4d6c
-
Filesize
212KB
MD58ca618969ac4812adc5fa667e2abf8a9
SHA1bd78273277467e95bed317d08c29618375a9b6e1
SHA2568dde8ae7557e944b284aa7aa7552e50bf8330ac57b5a5883252747911623d918
SHA5124a3c8f72d9f6f504771e292cbaf9ea23411200c6c5b757d88f10ff33a07e3c3c2d53765c23fae0117968abf65a66793482a6fe29b443948d50549d38b69a4d6c
-
Filesize
212KB
MD58ca618969ac4812adc5fa667e2abf8a9
SHA1bd78273277467e95bed317d08c29618375a9b6e1
SHA2568dde8ae7557e944b284aa7aa7552e50bf8330ac57b5a5883252747911623d918
SHA5124a3c8f72d9f6f504771e292cbaf9ea23411200c6c5b757d88f10ff33a07e3c3c2d53765c23fae0117968abf65a66793482a6fe29b443948d50549d38b69a4d6c
-
Filesize
212KB
MD58ca618969ac4812adc5fa667e2abf8a9
SHA1bd78273277467e95bed317d08c29618375a9b6e1
SHA2568dde8ae7557e944b284aa7aa7552e50bf8330ac57b5a5883252747911623d918
SHA5124a3c8f72d9f6f504771e292cbaf9ea23411200c6c5b757d88f10ff33a07e3c3c2d53765c23fae0117968abf65a66793482a6fe29b443948d50549d38b69a4d6c
-
Filesize
212KB
MD58ca618969ac4812adc5fa667e2abf8a9
SHA1bd78273277467e95bed317d08c29618375a9b6e1
SHA2568dde8ae7557e944b284aa7aa7552e50bf8330ac57b5a5883252747911623d918
SHA5124a3c8f72d9f6f504771e292cbaf9ea23411200c6c5b757d88f10ff33a07e3c3c2d53765c23fae0117968abf65a66793482a6fe29b443948d50549d38b69a4d6c