Analysis

  • max time kernel
    170s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/10/2023, 21:21

General

  • Target

    NEAS.637fbd6373e34a549d167895bb0a9a90.exe

  • Size

    4.3MB

  • MD5

    637fbd6373e34a549d167895bb0a9a90

  • SHA1

    11320ecabfdfacc6252c5dad2307e17fe616068e

  • SHA256

    d84ea29fcd4ab5a567304cb1b1652e56598a5c074dcdbc6204c7cd3969162895

  • SHA512

    6267503c6183e60be46bd71613cd37592c1df84b86b1a665bc15bb01eb38370b0edb6acf747ecba813bf4cbdbcede7bc1be2519d841424fd44b509b06f23a485

  • SSDEEP

    98304:rKpNIdVbVHMWmRQFNyeW0MGfiUVSKdujPs:O7IPJHFNN8E7duzs

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.637fbd6373e34a549d167895bb0a9a90.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.637fbd6373e34a549d167895bb0a9a90.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4980
    • \??\c:\users\admin\appdata\local\temp\neas.637fbd6373e34a549d167895bb0a9a90.exe 
      c:\users\admin\appdata\local\temp\neas.637fbd6373e34a549d167895bb0a9a90.exe 
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Modifies system certificate store
      PID:400
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:404
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2064
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:496
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1708
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:3964

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\neas.637fbd6373e34a549d167895bb0a9a90.exe 

          Filesize

          4.2MB

          MD5

          3a1f2fffc6257af1f4412be598b49ffa

          SHA1

          871c682f6ba9221705a4e5617d54fc51f1c63f91

          SHA256

          984ae3d5b2b05dbde6220ef5ea3d05453fc36322b3dc323241dc9fa2deaddcf9

          SHA512

          089469d651c2da1d26ab70d1a4b3ec71c62ee8d4da9c3b5073de1bde0e70cf83de6b5caf77657bff9e7b1355455c8fa5b1df5ecf837dd9ed5164340b9ebd3bdf

        • C:\Users\Admin\AppData\Local\Temp\package\tmp\graphics\[email protected]_

          Filesize

          15KB

          MD5

          577b7286c7b05cecde9bea0a0d39740e

          SHA1

          144d97afe83738177a2dbe43994f14ec11e44b53

          SHA256

          983aa3928f15f5154266be7063a75e1fce87238bbe81a910219dea01d5376824

          SHA512

          8cd55264a6e973bb6683c6f376672b74a263b48b087240df8296735fd7ae6274ee688fdb16d7febad14288a866ea47e78b114c357a9b03471b1e72df053ebcb0

        • C:\Users\Admin\AppData\Local\Temp\package\tmp\graphics\icon_button_news_mousedown.tga_

          Filesize

          20KB

          MD5

          00bf35778a90f9dfa68ce0d1a032d9b5

          SHA1

          de6a3d102de9a186e1585be14b49390dcb9605d6

          SHA256

          cab3a68b64d8bf22c44080f12d7eab5b281102a8761f804224074ab1f6130fe2

          SHA512

          342c9732ef4185dee691c9c8657a56f577f9c90fc43a4330bdc173536750cee1c40af4adac4f47ac5aca6b80ab347ebe2d31d38ea540245b38ab72ee8718a041

        • C:\Users\Admin\AppData\Local\Temp\package\tmp\tenfoot\resource\images\textinput\drop06.tga_

          Filesize

          244KB

          MD5

          c7afc24e396da59a4ef402ddd2ccbceb

          SHA1

          dafbca40f8420fdf6c426fa6a3f0f6a43fb493d9

          SHA256

          996cd2d01542cec922c384708dcbfc8aee8773333ebda9a398f0236675f129b1

          SHA512

          013ff1f14b8c7214c88e42cf5d270324f4bbac6bf6b5eafa7dadf8d658c0eaa97a52f326df62867dab7926e8edbcb5bac89a0e675c57de5558f78b1bce313ef2

        • C:\Windows\Resources\Themes\explorer.exe

          Filesize

          135KB

          MD5

          83b2435766b3f1b77e2ba48b69a8966c

          SHA1

          c101e2bf0581f51f475864d8d0d7b780077e59ba

          SHA256

          30f0b77ba16733749533cc9cd66bfc0c10dd963b0f2dbac6a1b9f98a4ac9511e

          SHA512

          c6d07d620b4012b66fcf23f7e9a4d10566d2c7e4720267dcf42b53042cae5862165a1409adab2ed7842ad63b89770f564aa0d6262bb79e07e1223543216ad608

        • C:\Windows\Resources\Themes\explorer.exe

          Filesize

          135KB

          MD5

          83b2435766b3f1b77e2ba48b69a8966c

          SHA1

          c101e2bf0581f51f475864d8d0d7b780077e59ba

          SHA256

          30f0b77ba16733749533cc9cd66bfc0c10dd963b0f2dbac6a1b9f98a4ac9511e

          SHA512

          c6d07d620b4012b66fcf23f7e9a4d10566d2c7e4720267dcf42b53042cae5862165a1409adab2ed7842ad63b89770f564aa0d6262bb79e07e1223543216ad608

        • C:\Windows\Resources\Themes\icsys.icn.exe

          Filesize

          135KB

          MD5

          87f7626b3622599a05ae809c64f163cb

          SHA1

          c556bbc549debe2e58c0d7f63a0d0a9cfeb5d4c9

          SHA256

          d5f3490086d0aa9e75c52faebfbeab0596ed9d9a4223f310fa15ce47e28ae1f2

          SHA512

          1d1cdee71fd9c102ee2f9db4bf0a3a63ef97e83efcabefe53d7911cde3058caac9c5f1b0ff6e1cd22dfd80a3870e0f76c5b2bf8463ca7217add781645fd37730

        • C:\Windows\Resources\Themes\icsys.icn.exe

          Filesize

          135KB

          MD5

          87f7626b3622599a05ae809c64f163cb

          SHA1

          c556bbc549debe2e58c0d7f63a0d0a9cfeb5d4c9

          SHA256

          d5f3490086d0aa9e75c52faebfbeab0596ed9d9a4223f310fa15ce47e28ae1f2

          SHA512

          1d1cdee71fd9c102ee2f9db4bf0a3a63ef97e83efcabefe53d7911cde3058caac9c5f1b0ff6e1cd22dfd80a3870e0f76c5b2bf8463ca7217add781645fd37730

        • C:\Windows\Resources\spoolsv.exe

          Filesize

          135KB

          MD5

          d15381bbff5c79d9afee464a8614715b

          SHA1

          890b075bf8ff1ce597ccde12077fb916f17ed194

          SHA256

          2ddce495aafda72fdd3caee5d2e437c6d93ffc6fd76116aa4e59f42e2cc3d5c2

          SHA512

          428872791602470dd591318eb9bca66bc1576f3813998e59b7ee72bdc3f5e9bd57e296d1d4135a74d8896d3c4cb8864a7e68ad47464600ca8889767b02003fe5

        • C:\Windows\Resources\spoolsv.exe

          Filesize

          135KB

          MD5

          d15381bbff5c79d9afee464a8614715b

          SHA1

          890b075bf8ff1ce597ccde12077fb916f17ed194

          SHA256

          2ddce495aafda72fdd3caee5d2e437c6d93ffc6fd76116aa4e59f42e2cc3d5c2

          SHA512

          428872791602470dd591318eb9bca66bc1576f3813998e59b7ee72bdc3f5e9bd57e296d1d4135a74d8896d3c4cb8864a7e68ad47464600ca8889767b02003fe5

        • C:\Windows\Resources\svchost.exe

          Filesize

          135KB

          MD5

          5669342f2532587f90a90bf17823d61f

          SHA1

          7ea1f2344992042fb2c5eb0e7582544909644f7e

          SHA256

          70216049ff2ff312684e2dee62378aaed062892372565211c2638cb1237303a5

          SHA512

          6f5e49c6d74e98bb25e22832ec137d848f69480cf68a4d25e53d4e181879a21e247f2d04a0b3c160e8bf5b2c43a6c84d3b1ada992d92ff1e15e66a9a9d05a67d

        • \??\c:\windows\resources\spoolsv.exe

          Filesize

          135KB

          MD5

          d15381bbff5c79d9afee464a8614715b

          SHA1

          890b075bf8ff1ce597ccde12077fb916f17ed194

          SHA256

          2ddce495aafda72fdd3caee5d2e437c6d93ffc6fd76116aa4e59f42e2cc3d5c2

          SHA512

          428872791602470dd591318eb9bca66bc1576f3813998e59b7ee72bdc3f5e9bd57e296d1d4135a74d8896d3c4cb8864a7e68ad47464600ca8889767b02003fe5

        • \??\c:\windows\resources\svchost.exe

          Filesize

          135KB

          MD5

          5669342f2532587f90a90bf17823d61f

          SHA1

          7ea1f2344992042fb2c5eb0e7582544909644f7e

          SHA256

          70216049ff2ff312684e2dee62378aaed062892372565211c2638cb1237303a5

          SHA512

          6f5e49c6d74e98bb25e22832ec137d848f69480cf68a4d25e53d4e181879a21e247f2d04a0b3c160e8bf5b2c43a6c84d3b1ada992d92ff1e15e66a9a9d05a67d

        • \??\c:\windows\resources\themes\explorer.exe

          Filesize

          135KB

          MD5

          83b2435766b3f1b77e2ba48b69a8966c

          SHA1

          c101e2bf0581f51f475864d8d0d7b780077e59ba

          SHA256

          30f0b77ba16733749533cc9cd66bfc0c10dd963b0f2dbac6a1b9f98a4ac9511e

          SHA512

          c6d07d620b4012b66fcf23f7e9a4d10566d2c7e4720267dcf42b53042cae5862165a1409adab2ed7842ad63b89770f564aa0d6262bb79e07e1223543216ad608

        • memory/404-54-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/496-50-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/1708-5139-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2064-4529-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/3964-49-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/4980-55-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/4980-0-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB