Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2023, 17:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.f47a7538af77e467037412c4e1f035b0.exe
Resource
win7-20231020-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.f47a7538af77e467037412c4e1f035b0.exe
Resource
win10v2004-20231020-en
4 signatures
150 seconds
General
-
Target
NEAS.f47a7538af77e467037412c4e1f035b0.exe
-
Size
49KB
-
MD5
f47a7538af77e467037412c4e1f035b0
-
SHA1
dccc87c5fdaf9dff784aee516d99e7fc4aa393b1
-
SHA256
1a5d86e4d538a9324b1eda10dee93d6b88c2fc71f6c3ba15ca7614f0bd414510
-
SHA512
c10c685f1aa9edb18cbd92e6b97900c08159f173b0af72167dbd52ea5e54c7d024db20233fe9c1cd1466df60754475b529313101825a4527393a5209a4d7d12e
-
SSDEEP
768:w37zj55N7fnokbb/RjUtS0xWboBK4hlHj5UUfoEl:wj55NzBv/1oc4hlHj5XoEl
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{93173A6A-5C48-E8BA-FC43-AC2E0966EB55} NEAS.f47a7538af77e467037412c4e1f035b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{93173A6A-5C48-E8BA-FC43-AC2E0966EB55}\stubpath = "%SystemRoot%\\system32\\vcapi.exe" NEAS.f47a7538af77e467037412c4e1f035b0.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\vcapi.exe NEAS.f47a7538af77e467037412c4e1f035b0.exe File opened for modification C:\Windows\SysWOW64\vcapi.exe NEAS.f47a7538af77e467037412c4e1f035b0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1876 NEAS.f47a7538af77e467037412c4e1f035b0.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1876 wrote to memory of 1980 1876 NEAS.f47a7538af77e467037412c4e1f035b0.exe 89 PID 1876 wrote to memory of 1980 1876 NEAS.f47a7538af77e467037412c4e1f035b0.exe 89 PID 1876 wrote to memory of 1980 1876 NEAS.f47a7538af77e467037412c4e1f035b0.exe 89 PID 1876 wrote to memory of 3444 1876 NEAS.f47a7538af77e467037412c4e1f035b0.exe 92 PID 1876 wrote to memory of 3444 1876 NEAS.f47a7538af77e467037412c4e1f035b0.exe 92 PID 1876 wrote to memory of 3444 1876 NEAS.f47a7538af77e467037412c4e1f035b0.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f47a7538af77e467037412c4e1f035b0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f47a7538af77e467037412c4e1f035b0.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Active Setup\Installed Components\{93173A6A-5C48-E8BA-FC43-AC2E0966EB55}" /f2⤵PID:1980
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\NEASF4~1.EXE > nul2⤵PID:3444
-