Analysis
-
max time kernel
145s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 21:14
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.15b62a3a32d002d3faafb488dec1f410.exe
Resource
win7-20231020-en
General
-
Target
NEAS.15b62a3a32d002d3faafb488dec1f410.exe
-
Size
600KB
-
MD5
15b62a3a32d002d3faafb488dec1f410
-
SHA1
2266a4a79e446e8c5d9f4b7c7ed02b3abe44a5ff
-
SHA256
06bb1c5e4c87467483aa4cff7caad8046eae27e9461fe8ec87b37f9e6fc8fb55
-
SHA512
7412e9380749dd80b4dd38636e378a120ee664a88c06291c3ab5be45b9fd24b549ebdc12984751268472cb8914dd40d3a1ce4f4291c59b61fd2e3666e8b0b9d0
-
SSDEEP
12288:+FeramCErWTRW8fdeA6YFlIX5lm8W6v5VLOR0i:OeraNEiTRW8fdeEOX5RvDA0i
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1016 B98C.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7z.sfx B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\xmsrv.dll B98C.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia.api B98C.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe B98C.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\rt3d.dll B98C.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\d3dcompiler_43.dll B98C.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\SaveAsRTF.api B98C.tmp File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VC\msdia90.dll B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\Csi.dll B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\Mso20win32client.dll B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\NPSPWRAP.DLL B98C.tmp File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe B98C.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\logsession.dll B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Web Server Extensions\16\BIN\FPWEC.DLL B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\MSVCR110.DLL B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\SystemX86\mfc140u.dll B98C.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\EQUATION\concrt140.dll B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\msoshext.dll B98C.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe B98C.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ACE.dll B98C.tmp File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\EBWebView\x86\EmbeddedBrowserWebView.dll B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\Mso98win32client.dll B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\concrt140.dll B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\Interceptor.dll B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe B98C.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe B98C.tmp File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe B98C.tmp File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\NAME.DLL B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\SystemX86\mfc140.dll B98C.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\filecompare.exe B98C.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia\MPP\Flash.mpp B98C.tmp File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroPDFImpl.dll B98C.tmp File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.177.11\MicrosoftEdgeUpdateCore.exe B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\JitV.dll B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\PPSLAX.DLL B98C.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\libcef.dll B98C.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia\MPP\MCIMPP.mpp B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\MSOHTMED.EXE B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\STSCOPY.DLL B98C.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\cryptocme.dll B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\mfc140u.dll B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\ONLNTCOMLIB.DLL B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\URLREDIR.DLL B98C.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Accessibility.api B98C.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm.api B98C.tmp File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll B98C.tmp File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R32.dll B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\concrt140.dll B98C.tmp File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe B98C.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe B98C.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Search.api B98C.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins3d\drvSOFT.x3d B98C.tmp File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\goopdate.dll B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\msolap.dll B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\msolui.dll B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\OLKFSTUB.DLL B98C.tmp File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_bho.dll B98C.tmp File opened for modification C:\Program Files\7-Zip\7zCon.sfx B98C.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\MSOIDCLIL.DLL B98C.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.dll B98C.tmp File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\EScript.api B98C.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 652 wrote to memory of 1016 652 NEAS.15b62a3a32d002d3faafb488dec1f410.exe 85 PID 652 wrote to memory of 1016 652 NEAS.15b62a3a32d002d3faafb488dec1f410.exe 85 PID 652 wrote to memory of 1016 652 NEAS.15b62a3a32d002d3faafb488dec1f410.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.15b62a3a32d002d3faafb488dec1f410.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.15b62a3a32d002d3faafb488dec1f410.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Local\Temp\B98C.tmpC:\Users\Admin\AppData\Local\Temp\B98C.tmp2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD51bfe591a4fe3d91b03cdf26eaacd8f89
SHA1719c37c320f518ac168c86723724891950911cea
SHA2569cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8
SHA51202f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\59D76868C250B3240414CE3EFBB12518_809DE37BF6F91747203FF7559791C460
Filesize471B
MD5c97729e2b44e500be22bffd54e4bf58a
SHA178f4bbdc38ed588359887e051b306ba6c6c58082
SHA2561816a9de15b036535c9c6ca3c344f8c6f640481517feb98048f86b1a47c2c9a8
SHA512d25ac18030a0caf738e30cd5465bfbaf7e55b39e0b592870e77be89a32392e6275c1093809dad038ddbe39517731b00ef13ceb2e116de48134e5f021899873fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419
Filesize471B
MD5d5dca730df319f765eb1b1cee9c3708d
SHA1933b4c5ceb314e4d8c2fc332355a9c17d7b2c0e5
SHA256d3f39b6306671bf1eaae163b2c478e5e9900273187893da4eb8be7e72bcee2cc
SHA512e20e60c3447b567a90deab7a554d631f1e70cad91933ffe9e2c8e1e1e8ad3102f1a5f27e92a9688c049b8fbe15d6d5070f246d874cb2853f7725a00622c02912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Filesize338B
MD52505d28e4e88da051ab9a07d399b6771
SHA1260245e442043058557bf3c77d61cd1f074d22c0
SHA25672710b77a68dddd277146ca1fd470362db341c644d2574fa788610a85cdc2c14
SHA512452e23730bdc0277206e374b3bdf2bbd995bcf413d3f417dc183d89417ca19c48e0634466b1405031822c8021d74a6c3f1ffe805e11d87c7283de1045d633e9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\59D76868C250B3240414CE3EFBB12518_809DE37BF6F91747203FF7559791C460
Filesize404B
MD5372b11abfe8624f65afc74887363de65
SHA1bd95c4763b3a416c1922faf1e8e078c7c59d36d0
SHA256ce03ea81b1b8fa3ddb9ef5d3620f4eb56c70e4ffbaa264950afcd6ece773170d
SHA51286b88f3560ae4de200a15c2a2f1e627d56d2907d983247780860dee4942d7264797a6c79b8364caccf846d873adc2e80020f60097a368df480d5d9fcda71daae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419
Filesize412B
MD5aae8f1d37fcef3df2bff9e887a8af9cf
SHA18f618eef4dcf47e99b9dd3ab07178aaf0f00d243
SHA256006a1f9b37de3ee2667098e0258664b7e86b8393e5000b6dd0906904ac6fc8ba
SHA512785a42c508c9304c5565b58068613c6cb03c985666c6e787828c121fefb8e448a36bb1296d13999ac17285924b2526a49fb6d5b2010da177489b09a49bf84d26
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666
-
Filesize
3KB
MD5fd1f28951b2c750eb6044619e213192c
SHA18ff721724908b9bb7498795aec38289c0cacc9f8
SHA25634cd2ab843e2af267dc8d2dd62b0fc69508c97096c0a5cdf0fd6467c4f6f9ff1
SHA51253a36ed24ad6be67f1bffb92bc3e16bf67d87abbe27a4f80951926ef44da93ea8b2375c62fe38dcfa3135ebf0d937027eb3f0e93d4d436b146d29ec45b68377d
-
Filesize
17KB
MD57127539702867af35c2eb9757b191480
SHA1b3b28103397d7bd2ef27010d5ea328ac047c6569
SHA256ff14c841276ab90280ae4af4eaf2d7604e41e37d1925436a70f6faeda8e318f5
SHA51212c124510b971e1ed546bb6d0276a327d8153bed6c96efa9a573190a37cccaca03338e5e219303094f4ef0895681776ac81dcee33d65009132747e4a8a9be2e0