Analysis
-
max time kernel
148s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
21-10-2023 21:22
Behavioral task
behavioral1
Sample
NEAS.65d47b0d5d2fc73114d75337461407c0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.65d47b0d5d2fc73114d75337461407c0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.65d47b0d5d2fc73114d75337461407c0.exe
-
Size
1.8MB
-
MD5
65d47b0d5d2fc73114d75337461407c0
-
SHA1
c641c57202abc91093b0d3ee1e6630d1902edb83
-
SHA256
848fec611993a22622cd8a3a575182a6f1563ee775d0b57414b85ca85b972d51
-
SHA512
ae8a3cb446f4dd5eedf807525465f132c8bf5caff5cfc52471416786cd01abe71593e512e6c4bdffc6f45ca5ff1874d132369ab1e22dd2e78622f7a85e355903
-
SSDEEP
24576:9EmvS3PLNyroPr4GGZdjfKRvI+2GRK43IZpKZy0tBAQTkI3223vBOSHVct6n:9E13D8c4GG/jfKCfGgzKEcuI3xvYSHV3
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
resource yara_rule behavioral1/memory/2760-0-0x0000000000340000-0x00000000004ED000-memory.dmp upx behavioral1/memory/2760-1-0x0000000000340000-0x00000000004ED000-memory.dmp upx -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2720 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2720 explorer.exe Token: SeShutdownPrivilege 2720 explorer.exe Token: SeShutdownPrivilege 2720 explorer.exe Token: SeShutdownPrivilege 2720 explorer.exe Token: SeShutdownPrivilege 2720 explorer.exe Token: SeShutdownPrivilege 2720 explorer.exe Token: SeShutdownPrivilege 2720 explorer.exe Token: SeShutdownPrivilege 2720 explorer.exe Token: SeShutdownPrivilege 2720 explorer.exe Token: SeShutdownPrivilege 2720 explorer.exe Token: SeShutdownPrivilege 2720 explorer.exe Token: SeShutdownPrivilege 2720 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe 2720 explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.65d47b0d5d2fc73114d75337461407c0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.65d47b0d5d2fc73114d75337461407c0.exe"1⤵PID:2760
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2720