Analysis
-
max time kernel
138s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 21:20
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.5a387559ea6345848e315ab5e27a2300.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.5a387559ea6345848e315ab5e27a2300.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.5a387559ea6345848e315ab5e27a2300.exe
-
Size
4.4MB
-
MD5
5a387559ea6345848e315ab5e27a2300
-
SHA1
59301325101c0ba83fc3b659759be02e0b31a9c2
-
SHA256
6e4e941227544101b4c717b4231758f4d6a7589de40a9120a3c72c19eaa6a0f2
-
SHA512
76dab482642c228784bb0609e0d80613d6d299514d8f315516754748d9f2cea4586d891eb445d159c9f59366ffdd6e139ee4a2753c0f6708c0ba6506b946579c
-
SSDEEP
1536:9nTwVYlmkpzEcHGtan2KR3dvJ77zZ38Ihp4:pHpZAKzvJNM9
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NEAS.5a387559ea6345848e315ab5e27a2300.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run NEAS.5a387559ea6345848e315ab5e27a2300.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\WOW64 Emulator = "\"C:\\ProgramData\\WOW64\\csrss.exe\"" NEAS.5a387559ea6345848e315ab5e27a2300.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1488 netsh.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 3524 attrib.exe 4376 attrib.exe -
Executes dropped EXE 1 IoCs
pid Process 3820 csrss.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WOW64 Emulator = "\"C:\\ProgramData\\WOW64\\csrss.exe\"" NEAS.5a387559ea6345848e315ab5e27a2300.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NEAS.5a387559ea6345848e315ab5e27a2300.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NEAS.5a387559ea6345848e315ab5e27a2300.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\WOW64 Emulator.url NEAS.5a387559ea6345848e315ab5e27a2300.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\NEAS.5a387559ea6345848e315ab5e27a2300.exe.log NEAS.5a387559ea6345848e315ab5e27a2300.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" NEAS.5a387559ea6345848e315ab5e27a2300.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" NEAS.5a387559ea6345848e315ab5e27a2300.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" NEAS.5a387559ea6345848e315ab5e27a2300.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" NEAS.5a387559ea6345848e315ab5e27a2300.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ NEAS.5a387559ea6345848e315ab5e27a2300.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4980 NEAS.5a387559ea6345848e315ab5e27a2300.exe 4980 NEAS.5a387559ea6345848e315ab5e27a2300.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4980 NEAS.5a387559ea6345848e315ab5e27a2300.exe Token: SeDebugPrivilege 876 NEAS.5a387559ea6345848e315ab5e27a2300.exe Token: SeDebugPrivilege 3820 csrss.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 876 wrote to memory of 3932 876 NEAS.5a387559ea6345848e315ab5e27a2300.exe 93 PID 876 wrote to memory of 3932 876 NEAS.5a387559ea6345848e315ab5e27a2300.exe 93 PID 876 wrote to memory of 3932 876 NEAS.5a387559ea6345848e315ab5e27a2300.exe 93 PID 3932 wrote to memory of 3524 3932 cmd.exe 95 PID 3932 wrote to memory of 3524 3932 cmd.exe 95 PID 3932 wrote to memory of 3524 3932 cmd.exe 95 PID 876 wrote to memory of 4516 876 NEAS.5a387559ea6345848e315ab5e27a2300.exe 96 PID 876 wrote to memory of 4516 876 NEAS.5a387559ea6345848e315ab5e27a2300.exe 96 PID 876 wrote to memory of 4516 876 NEAS.5a387559ea6345848e315ab5e27a2300.exe 96 PID 4516 wrote to memory of 4376 4516 cmd.exe 98 PID 4516 wrote to memory of 4376 4516 cmd.exe 98 PID 4516 wrote to memory of 4376 4516 cmd.exe 98 PID 876 wrote to memory of 1488 876 NEAS.5a387559ea6345848e315ab5e27a2300.exe 99 PID 876 wrote to memory of 1488 876 NEAS.5a387559ea6345848e315ab5e27a2300.exe 99 PID 876 wrote to memory of 1488 876 NEAS.5a387559ea6345848e315ab5e27a2300.exe 99 PID 876 wrote to memory of 3820 876 NEAS.5a387559ea6345848e315ab5e27a2300.exe 101 PID 876 wrote to memory of 3820 876 NEAS.5a387559ea6345848e315ab5e27a2300.exe 101 PID 876 wrote to memory of 3820 876 NEAS.5a387559ea6345848e315ab5e27a2300.exe 101 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NEAS.5a387559ea6345848e315ab5e27a2300.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 3524 attrib.exe 4376 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5a387559ea6345848e315ab5e27a2300.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5a387559ea6345848e315ab5e27a2300.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\NEAS.5a387559ea6345848e315ab5e27a2300.exeC:\Users\Admin\AppData\Local\Temp\NEAS.5a387559ea6345848e315ab5e27a2300.exe2⤵
- UAC bypass
- Adds policy Run key to start application
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:876 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c attrib +s +h +r C:\ProgramData\JRE3⤵
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h +r C:\ProgramData\JRE4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3524
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c attrib +s +h +r C:\ProgramData\WOW643⤵
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h +r C:\ProgramData\WOW644⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4376
-
-
-
C:\Windows\SysWOW64\netsh.exe"netsh.exe" advfirewall firewall add rule name="WOW64 Emulator" dir=in action=allowdescription="Windows Component" program="C:\ProgramData\WOW64\csrss.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:1488
-
-
C:\ProgramData\WOW64\csrss.exe"C:\ProgramData\WOW64\csrss.exe"3⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3820
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.4MB
MD55a387559ea6345848e315ab5e27a2300
SHA159301325101c0ba83fc3b659759be02e0b31a9c2
SHA2566e4e941227544101b4c717b4231758f4d6a7589de40a9120a3c72c19eaa6a0f2
SHA51276dab482642c228784bb0609e0d80613d6d299514d8f315516754748d9f2cea4586d891eb445d159c9f59366ffdd6e139ee4a2753c0f6708c0ba6506b946579c
-
Filesize
4.4MB
MD55a387559ea6345848e315ab5e27a2300
SHA159301325101c0ba83fc3b659759be02e0b31a9c2
SHA2566e4e941227544101b4c717b4231758f4d6a7589de40a9120a3c72c19eaa6a0f2
SHA51276dab482642c228784bb0609e0d80613d6d299514d8f315516754748d9f2cea4586d891eb445d159c9f59366ffdd6e139ee4a2753c0f6708c0ba6506b946579c
-
Filesize
4.4MB
MD55a387559ea6345848e315ab5e27a2300
SHA159301325101c0ba83fc3b659759be02e0b31a9c2
SHA2566e4e941227544101b4c717b4231758f4d6a7589de40a9120a3c72c19eaa6a0f2
SHA51276dab482642c228784bb0609e0d80613d6d299514d8f315516754748d9f2cea4586d891eb445d159c9f59366ffdd6e139ee4a2753c0f6708c0ba6506b946579c