Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
22-10-2023 17:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.f47a7538af77e467037412c4e1f035b0.exe
Resource
win7-20231020-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.f47a7538af77e467037412c4e1f035b0.exe
Resource
win10v2004-20231020-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
NEAS.f47a7538af77e467037412c4e1f035b0.exe
-
Size
49KB
-
MD5
f47a7538af77e467037412c4e1f035b0
-
SHA1
dccc87c5fdaf9dff784aee516d99e7fc4aa393b1
-
SHA256
1a5d86e4d538a9324b1eda10dee93d6b88c2fc71f6c3ba15ca7614f0bd414510
-
SHA512
c10c685f1aa9edb18cbd92e6b97900c08159f173b0af72167dbd52ea5e54c7d024db20233fe9c1cd1466df60754475b529313101825a4527393a5209a4d7d12e
-
SSDEEP
768:w37zj55N7fnokbb/RjUtS0xWboBK4hlHj5UUfoEl:wj55NzBv/1oc4hlHj5XoEl
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{744A2FD2-8CC5-5E65-1169-B54D19925426} NEAS.f47a7538af77e467037412c4e1f035b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{744A2FD2-8CC5-5E65-1169-B54D19925426}\stubpath = "%SystemRoot%\\system32\\vcapi.exe" NEAS.f47a7538af77e467037412c4e1f035b0.exe -
Deletes itself 1 IoCs
pid Process 2952 cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\vcapi.exe NEAS.f47a7538af77e467037412c4e1f035b0.exe File opened for modification C:\Windows\SysWOW64\vcapi.exe NEAS.f47a7538af77e467037412c4e1f035b0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2184 NEAS.f47a7538af77e467037412c4e1f035b0.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2352 2184 NEAS.f47a7538af77e467037412c4e1f035b0.exe 28 PID 2184 wrote to memory of 2352 2184 NEAS.f47a7538af77e467037412c4e1f035b0.exe 28 PID 2184 wrote to memory of 2352 2184 NEAS.f47a7538af77e467037412c4e1f035b0.exe 28 PID 2184 wrote to memory of 2352 2184 NEAS.f47a7538af77e467037412c4e1f035b0.exe 28 PID 2184 wrote to memory of 2952 2184 NEAS.f47a7538af77e467037412c4e1f035b0.exe 33 PID 2184 wrote to memory of 2952 2184 NEAS.f47a7538af77e467037412c4e1f035b0.exe 33 PID 2184 wrote to memory of 2952 2184 NEAS.f47a7538af77e467037412c4e1f035b0.exe 33 PID 2184 wrote to memory of 2952 2184 NEAS.f47a7538af77e467037412c4e1f035b0.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f47a7538af77e467037412c4e1f035b0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f47a7538af77e467037412c4e1f035b0.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Active Setup\Installed Components\{744A2FD2-8CC5-5E65-1169-B54D19925426}" /f2⤵PID:2352
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\NEASF4~1.EXE > nul2⤵
- Deletes itself
PID:2952
-