Analysis
-
max time kernel
63s -
max time network
76s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2023, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.fb37b6bb771d8698f682064eba2f4930.dll
Resource
win7-20230831-en
General
-
Target
NEAS.fb37b6bb771d8698f682064eba2f4930.dll
-
Size
120KB
-
MD5
fb37b6bb771d8698f682064eba2f4930
-
SHA1
47822368969059a3ef7157914f164b4af055557e
-
SHA256
716a6b2012d5e7237c8a6fd353cbfe8555e94701c763b91bd823ec683fd08b32
-
SHA512
1cc1d8f30dd1c3cf0cbc9d373356852bc1c8c6b5f22624d4bb4ac9c2af0d480f10c3fa65e789a98cec89380f5361a7d219361d7fc4b9180773e424931c58c746
-
SSDEEP
1536:POzqnhwyDaR1ptBy4RvWpvY9pE6rXEAF86vYA57XTlvKo0VsyTmEIPcj9k:Ps4hwHcSvWVAp5UAFx5tdisyTm3Pcj
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e58c157.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e58c157.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e58c157.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e58c157.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e58c157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e58c157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e58c157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e58c157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e58c157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e58c157.exe -
Executes dropped EXE 2 IoCs
pid Process 4664 e58c157.exe 1852 e58fc0e.exe -
resource yara_rule behavioral2/memory/4664-6-0x0000000000790000-0x000000000184A000-memory.dmp upx behavioral2/memory/4664-8-0x0000000000790000-0x000000000184A000-memory.dmp upx behavioral2/memory/4664-9-0x0000000000790000-0x000000000184A000-memory.dmp upx behavioral2/memory/4664-10-0x0000000000790000-0x000000000184A000-memory.dmp upx behavioral2/memory/4664-11-0x0000000000790000-0x000000000184A000-memory.dmp upx behavioral2/memory/4664-13-0x0000000000790000-0x000000000184A000-memory.dmp upx behavioral2/memory/4664-14-0x0000000000790000-0x000000000184A000-memory.dmp upx behavioral2/memory/4664-24-0x0000000000790000-0x000000000184A000-memory.dmp upx behavioral2/memory/4664-25-0x0000000000790000-0x000000000184A000-memory.dmp upx behavioral2/memory/4664-31-0x0000000000790000-0x000000000184A000-memory.dmp upx behavioral2/memory/4664-33-0x0000000000790000-0x000000000184A000-memory.dmp upx behavioral2/memory/4664-34-0x0000000000790000-0x000000000184A000-memory.dmp upx behavioral2/memory/4664-35-0x0000000000790000-0x000000000184A000-memory.dmp upx behavioral2/memory/4664-36-0x0000000000790000-0x000000000184A000-memory.dmp upx behavioral2/memory/4664-37-0x0000000000790000-0x000000000184A000-memory.dmp upx behavioral2/memory/4664-40-0x0000000000790000-0x000000000184A000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e58c157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e58c157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e58c157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e58c157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e58c157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e58c157.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e58c157.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e58c157.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\e58f671 e58c157.exe File opened for modification C:\Windows\SYSTEM.INI e58c157.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4664 e58c157.exe 4664 e58c157.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe Token: SeDebugPrivilege 4664 e58c157.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4004 wrote to memory of 5512 4004 rundll32.exe 86 PID 4004 wrote to memory of 5512 4004 rundll32.exe 86 PID 4004 wrote to memory of 5512 4004 rundll32.exe 86 PID 5512 wrote to memory of 4664 5512 rundll32.exe 94 PID 5512 wrote to memory of 4664 5512 rundll32.exe 94 PID 5512 wrote to memory of 4664 5512 rundll32.exe 94 PID 4664 wrote to memory of 788 4664 e58c157.exe 85 PID 4664 wrote to memory of 796 4664 e58c157.exe 84 PID 4664 wrote to memory of 388 4664 e58c157.exe 9 PID 4664 wrote to memory of 2344 4664 e58c157.exe 62 PID 4664 wrote to memory of 2380 4664 e58c157.exe 61 PID 4664 wrote to memory of 2460 4664 e58c157.exe 58 PID 4664 wrote to memory of 3236 4664 e58c157.exe 49 PID 4664 wrote to memory of 3436 4664 e58c157.exe 47 PID 4664 wrote to memory of 3672 4664 e58c157.exe 46 PID 4664 wrote to memory of 3888 4664 e58c157.exe 45 PID 4664 wrote to memory of 3960 4664 e58c157.exe 20 PID 4664 wrote to memory of 4048 4664 e58c157.exe 44 PID 4664 wrote to memory of 4124 4664 e58c157.exe 43 PID 4664 wrote to memory of 5088 4664 e58c157.exe 41 PID 4664 wrote to memory of 4780 4664 e58c157.exe 23 PID 4664 wrote to memory of 4040 4664 e58c157.exe 29 PID 4664 wrote to memory of 5372 4664 e58c157.exe 24 PID 4664 wrote to memory of 4004 4664 e58c157.exe 48 PID 4664 wrote to memory of 5512 4664 e58c157.exe 86 PID 4664 wrote to memory of 5512 4664 e58c157.exe 86 PID 4664 wrote to memory of 4536 4664 e58c157.exe 88 PID 5512 wrote to memory of 1852 5512 rundll32.exe 95 PID 5512 wrote to memory of 1852 5512 rundll32.exe 95 PID 5512 wrote to memory of 1852 5512 rundll32.exe 95 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e58c157.exe
Processes
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:388
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3960
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:4780
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:5372
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca1⤵PID:4040
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:5088
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4124
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4048
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3888
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3436
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.fb37b6bb771d8698f682064eba2f4930.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.fb37b6bb771d8698f682064eba2f4930.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:5512 -
C:\Users\Admin\AppData\Local\Temp\e58c157.exeC:\Users\Admin\AppData\Local\Temp\e58c157.exe3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4664
-
-
C:\Users\Admin\AppData\Local\Temp\e58fc0e.exeC:\Users\Admin\AppData\Local\Temp\e58fc0e.exe3⤵
- Executes dropped EXE
PID:1852
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3236
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2460
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2380
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2344
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:796
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:788
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4536
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD52b7e805abacc5046c7c2aef26b0a34ac
SHA18b521ced6596edf7c09c81f40248b5f0524bfed0
SHA256b0dcb3f6d64810d6e577fa69dd8fe514de7422b8a30dd439fe83dbb1a78786c7
SHA51203c65d0fe0d3ecadcdc545707d2378291ceb447944d5ebee0257a4edc49753cd64dc9c8e3e937aae88ad55e40c4431a7b1d094188f42a094c6fdbeb5337d033a
-
Filesize
97KB
MD52b7e805abacc5046c7c2aef26b0a34ac
SHA18b521ced6596edf7c09c81f40248b5f0524bfed0
SHA256b0dcb3f6d64810d6e577fa69dd8fe514de7422b8a30dd439fe83dbb1a78786c7
SHA51203c65d0fe0d3ecadcdc545707d2378291ceb447944d5ebee0257a4edc49753cd64dc9c8e3e937aae88ad55e40c4431a7b1d094188f42a094c6fdbeb5337d033a
-
Filesize
97KB
MD52b7e805abacc5046c7c2aef26b0a34ac
SHA18b521ced6596edf7c09c81f40248b5f0524bfed0
SHA256b0dcb3f6d64810d6e577fa69dd8fe514de7422b8a30dd439fe83dbb1a78786c7
SHA51203c65d0fe0d3ecadcdc545707d2378291ceb447944d5ebee0257a4edc49753cd64dc9c8e3e937aae88ad55e40c4431a7b1d094188f42a094c6fdbeb5337d033a
-
Filesize
97KB
MD52b7e805abacc5046c7c2aef26b0a34ac
SHA18b521ced6596edf7c09c81f40248b5f0524bfed0
SHA256b0dcb3f6d64810d6e577fa69dd8fe514de7422b8a30dd439fe83dbb1a78786c7
SHA51203c65d0fe0d3ecadcdc545707d2378291ceb447944d5ebee0257a4edc49753cd64dc9c8e3e937aae88ad55e40c4431a7b1d094188f42a094c6fdbeb5337d033a