Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
21/10/2023, 21:14
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.15b62a3a32d002d3faafb488dec1f410.exe
Resource
win7-20231020-en
General
-
Target
NEAS.15b62a3a32d002d3faafb488dec1f410.exe
-
Size
600KB
-
MD5
15b62a3a32d002d3faafb488dec1f410
-
SHA1
2266a4a79e446e8c5d9f4b7c7ed02b3abe44a5ff
-
SHA256
06bb1c5e4c87467483aa4cff7caad8046eae27e9461fe8ec87b37f9e6fc8fb55
-
SHA512
7412e9380749dd80b4dd38636e378a120ee664a88c06291c3ab5be45b9fd24b549ebdc12984751268472cb8914dd40d3a1ce4f4291c59b61fd2e3666e8b0b9d0
-
SSDEEP
12288:+FeramCErWTRW8fdeA6YFlIX5lm8W6v5VLOR0i:OeraNEiTRW8fdeEOX5RvDA0i
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1780 3C84.tmp -
Loads dropped DLL 2 IoCs
pid Process 1736 NEAS.15b62a3a32d002d3faafb488dec1f410.exe 1736 NEAS.15b62a3a32d002d3faafb488dec1f410.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INFOPATH.EXE 3C84.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\IA32.api 3C84.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\drvDX8.x3d 3C84.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLMF.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\MSB1XTOR.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSO.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSStr32.dll 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSHY7FR.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONMAIN.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VPREVIEW.EXE 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\DELIMDOS.FAE 3C84.tmp File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe 3C84.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\MOFL.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CNFNOT32.EXE 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GKWord.dll 3C84.tmp File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\WebKit.dll 3C84.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\EPSIMP32.FLT 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE 3C84.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\RICHED20.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\AUTHZAX.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\URLREDIR.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\OLTASK.FAE 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPSLAX.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACEODBC.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\msolui100.dll 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONTAB32.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IPOLK.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOCFUIUTILITIESDLL.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NAME.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OART.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OISGRAPH.DLL 3C84.tmp File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeLinguistic.dll 3C84.tmp File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AXSLE.dll 3C84.tmp File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll 3C84.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\VBE7.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONWordAddin.dll 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\ORG97.SAM 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VVIEWER.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Library\SOLVER\SOLVER32.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\sqlceca35.dll 3C84.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\Real.mpp 3C84.tmp File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR.dll 3C84.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Setup.exe 3C84.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\FBIBLIO.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\BIB.dll 3C84.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\FPLACE.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONBttnOL.dll 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XPAGE3C.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\EXPSRV.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\FSTOCK.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EMSMDB32.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GFX.DLL 3C84.tmp File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe 3C84.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annots.api 3C84.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia.api 3C84.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACEEXCH.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\XLSLICER.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADDINS\MSVCR71.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\FPWEC.DLL 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CLVIEW.EXE 3C84.tmp File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnvpxy.dll 3C84.tmp File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AXE8SharedExpat.dll 3C84.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\rt3d.dll 3C84.tmp -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\assembly\GAC_32\System.Data.OracleClient\2.0.0.0__b77a5c561934e089\System.Data.OracleClient.dll 3C84.tmp File created C:\Windows\assembly\GAC_32\PresentationCore\3.0.0.0__31bf3856ad364e35\wpfgfx_v0300.dll 3C84.tmp File created C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll 3C84.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1780 1736 NEAS.15b62a3a32d002d3faafb488dec1f410.exe 29 PID 1736 wrote to memory of 1780 1736 NEAS.15b62a3a32d002d3faafb488dec1f410.exe 29 PID 1736 wrote to memory of 1780 1736 NEAS.15b62a3a32d002d3faafb488dec1f410.exe 29 PID 1736 wrote to memory of 1780 1736 NEAS.15b62a3a32d002d3faafb488dec1f410.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.15b62a3a32d002d3faafb488dec1f410.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.15b62a3a32d002d3faafb488dec1f410.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\3C84.tmpC:\Users\Admin\AppData\Local\Temp\3C84.tmp2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
PID:1780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59df9e7b980bd390203f55d28ec8f9950
SHA12496bcad619e5c839a7b9cafb185ee4954d9a698
SHA2560e55a28f73ee2b99f08462de03c23385101b7660ac072ab3533276ca85662e54
SHA5122ad6521d55a1f9dac05d2e75c76004ec05ec57bd568e931e620a226ce7bdde7ed6849c6537df2e770f124df6603ebf8703ade18bf3cebca12b50cb346497154d
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
125B
MD55ab328ad8bbb152faf682da8d6f09fea
SHA1f2a08728426b4d8a19294747cde6f680293b0211
SHA256e50ba417b3c1b1ca8bec6bb81d2dfc24bf20ec580301592b796cb87a8c1603ec
SHA512cbcd2c7a2290f78febe6c83f7fb5c35828d09c65f825ebeab30eb10e58bc9fd7b876c737fe9c9362e9708649c45f1040e1024f5405a85cd36eabf04eeefcf3fc
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666