Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
22/10/2023, 17:16
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe
-
Size
135KB
-
MD5
2c93c6014e7e24b2253a91a0ed3e5b20
-
SHA1
ee0dd1e6cf351e1feca39e69cb4896a0d8dbf0bc
-
SHA256
cd2f9988b46cefad6e96badc9e7018805c62af56a616c3d7200a3bec7ab86320
-
SHA512
139518c9fb860b5feda545fe3aad5601f2a9d09cbf5cf35e8148609cde42afde52bd6be403956bdc06080667e8b8df03084a4408f12b0af4811f012582da10a2
-
SSDEEP
1536:4fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVgyO:4VqoCl/YgjxEufVU0TbTyDDalayO
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3986878123-1347213090-2173403696-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3986878123-1347213090-2173403696-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2524 explorer.exe 2660 spoolsv.exe 2764 svchost.exe 2716 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 1064 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 2524 explorer.exe 2660 spoolsv.exe 2764 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2104 schtasks.exe 2972 schtasks.exe 2848 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1064 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 1064 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 1064 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 1064 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 1064 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 1064 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 1064 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 1064 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 1064 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 1064 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 1064 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 1064 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 1064 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 1064 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 1064 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 1064 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 1064 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 2524 explorer.exe 2524 explorer.exe 2524 explorer.exe 2524 explorer.exe 2524 explorer.exe 2524 explorer.exe 2524 explorer.exe 2524 explorer.exe 2524 explorer.exe 2524 explorer.exe 2524 explorer.exe 2524 explorer.exe 2524 explorer.exe 2524 explorer.exe 2524 explorer.exe 2524 explorer.exe 2764 svchost.exe 2764 svchost.exe 2764 svchost.exe 2764 svchost.exe 2764 svchost.exe 2764 svchost.exe 2764 svchost.exe 2764 svchost.exe 2764 svchost.exe 2764 svchost.exe 2764 svchost.exe 2764 svchost.exe 2764 svchost.exe 2764 svchost.exe 2764 svchost.exe 2764 svchost.exe 2524 explorer.exe 2524 explorer.exe 2524 explorer.exe 2524 explorer.exe 2764 svchost.exe 2764 svchost.exe 2764 svchost.exe 2524 explorer.exe 2764 svchost.exe 2524 explorer.exe 2524 explorer.exe 2764 svchost.exe 2764 svchost.exe 2524 explorer.exe 2524 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2524 explorer.exe 2764 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1064 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 1064 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 2524 explorer.exe 2524 explorer.exe 2660 spoolsv.exe 2660 spoolsv.exe 2764 svchost.exe 2764 svchost.exe 2716 spoolsv.exe 2716 spoolsv.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1064 wrote to memory of 2524 1064 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 28 PID 1064 wrote to memory of 2524 1064 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 28 PID 1064 wrote to memory of 2524 1064 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 28 PID 1064 wrote to memory of 2524 1064 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 28 PID 2524 wrote to memory of 2660 2524 explorer.exe 29 PID 2524 wrote to memory of 2660 2524 explorer.exe 29 PID 2524 wrote to memory of 2660 2524 explorer.exe 29 PID 2524 wrote to memory of 2660 2524 explorer.exe 29 PID 2660 wrote to memory of 2764 2660 spoolsv.exe 30 PID 2660 wrote to memory of 2764 2660 spoolsv.exe 30 PID 2660 wrote to memory of 2764 2660 spoolsv.exe 30 PID 2660 wrote to memory of 2764 2660 spoolsv.exe 30 PID 2764 wrote to memory of 2716 2764 svchost.exe 31 PID 2764 wrote to memory of 2716 2764 svchost.exe 31 PID 2764 wrote to memory of 2716 2764 svchost.exe 31 PID 2764 wrote to memory of 2716 2764 svchost.exe 31 PID 2524 wrote to memory of 2892 2524 explorer.exe 32 PID 2524 wrote to memory of 2892 2524 explorer.exe 32 PID 2524 wrote to memory of 2892 2524 explorer.exe 32 PID 2524 wrote to memory of 2892 2524 explorer.exe 32 PID 2764 wrote to memory of 2104 2764 svchost.exe 33 PID 2764 wrote to memory of 2104 2764 svchost.exe 33 PID 2764 wrote to memory of 2104 2764 svchost.exe 33 PID 2764 wrote to memory of 2104 2764 svchost.exe 33 PID 2764 wrote to memory of 2972 2764 svchost.exe 38 PID 2764 wrote to memory of 2972 2764 svchost.exe 38 PID 2764 wrote to memory of 2972 2764 svchost.exe 38 PID 2764 wrote to memory of 2972 2764 svchost.exe 38 PID 2764 wrote to memory of 2848 2764 svchost.exe 40 PID 2764 wrote to memory of 2848 2764 svchost.exe 40 PID 2764 wrote to memory of 2848 2764 svchost.exe 40 PID 2764 wrote to memory of 2848 2764 svchost.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1064 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2716
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 18:35 /f5⤵
- Creates scheduled task(s)
PID:2104
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 18:36 /f5⤵
- Creates scheduled task(s)
PID:2972
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 18:37 /f5⤵
- Creates scheduled task(s)
PID:2848
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2892
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5030b4257e878543bb48f483f61cd599e
SHA190e4afde9de837660570fc903ed5a62a140e115b
SHA2565e229e262c53a67e5b3dfd98fe11908e57c9b0fe9ff72bfce68fdc4e8e25ab00
SHA512899e857d929c481d44a47a4186a00cc151f9da89f7ffd3515d2db87036b104eb0773d28edf29f195581210e0b801c03b155434e1a756bea499c49edacee5dc97
-
Filesize
135KB
MD5514a3a85667515260ec4585c421bee17
SHA1829f595b30b21f5274a34c68f3ef580b332dfa9b
SHA256abbc4a923aa47c3046c5b62d063a81764d41edadc405c14d4e653244ef7065ba
SHA512fa0ef7be01f178979d40fa434b2d0c510bbf6df48229dbe953c9163a0811d87dfd093593c68b626c124d12ffdbda22fb0a193feb7f88cd41fc169fdb34a9813c
-
Filesize
135KB
MD5514a3a85667515260ec4585c421bee17
SHA1829f595b30b21f5274a34c68f3ef580b332dfa9b
SHA256abbc4a923aa47c3046c5b62d063a81764d41edadc405c14d4e653244ef7065ba
SHA512fa0ef7be01f178979d40fa434b2d0c510bbf6df48229dbe953c9163a0811d87dfd093593c68b626c124d12ffdbda22fb0a193feb7f88cd41fc169fdb34a9813c
-
Filesize
135KB
MD5514a3a85667515260ec4585c421bee17
SHA1829f595b30b21f5274a34c68f3ef580b332dfa9b
SHA256abbc4a923aa47c3046c5b62d063a81764d41edadc405c14d4e653244ef7065ba
SHA512fa0ef7be01f178979d40fa434b2d0c510bbf6df48229dbe953c9163a0811d87dfd093593c68b626c124d12ffdbda22fb0a193feb7f88cd41fc169fdb34a9813c
-
Filesize
135KB
MD509a4ba713536f342faa750e8a9e34d18
SHA15ecdb36c9885ab3449aa8f2c5db971efdf3b0ffa
SHA256621e4bbccdbce379019e968e6a1dec91578a9c085aad1e87bcd5388b51fd0dca
SHA5128489bf7dc2e2f2fbfb09e6179f17bb750e0ca125b118da44fa774a24c3c36de8aa4880d1b1ef11682ddc7b0a82d02fc510c110f2f3e9556ff159e4b465634f01
-
Filesize
135KB
MD5514a3a85667515260ec4585c421bee17
SHA1829f595b30b21f5274a34c68f3ef580b332dfa9b
SHA256abbc4a923aa47c3046c5b62d063a81764d41edadc405c14d4e653244ef7065ba
SHA512fa0ef7be01f178979d40fa434b2d0c510bbf6df48229dbe953c9163a0811d87dfd093593c68b626c124d12ffdbda22fb0a193feb7f88cd41fc169fdb34a9813c
-
Filesize
135KB
MD509a4ba713536f342faa750e8a9e34d18
SHA15ecdb36c9885ab3449aa8f2c5db971efdf3b0ffa
SHA256621e4bbccdbce379019e968e6a1dec91578a9c085aad1e87bcd5388b51fd0dca
SHA5128489bf7dc2e2f2fbfb09e6179f17bb750e0ca125b118da44fa774a24c3c36de8aa4880d1b1ef11682ddc7b0a82d02fc510c110f2f3e9556ff159e4b465634f01
-
Filesize
135KB
MD5030b4257e878543bb48f483f61cd599e
SHA190e4afde9de837660570fc903ed5a62a140e115b
SHA2565e229e262c53a67e5b3dfd98fe11908e57c9b0fe9ff72bfce68fdc4e8e25ab00
SHA512899e857d929c481d44a47a4186a00cc151f9da89f7ffd3515d2db87036b104eb0773d28edf29f195581210e0b801c03b155434e1a756bea499c49edacee5dc97
-
Filesize
135KB
MD5030b4257e878543bb48f483f61cd599e
SHA190e4afde9de837660570fc903ed5a62a140e115b
SHA2565e229e262c53a67e5b3dfd98fe11908e57c9b0fe9ff72bfce68fdc4e8e25ab00
SHA512899e857d929c481d44a47a4186a00cc151f9da89f7ffd3515d2db87036b104eb0773d28edf29f195581210e0b801c03b155434e1a756bea499c49edacee5dc97
-
Filesize
135KB
MD5514a3a85667515260ec4585c421bee17
SHA1829f595b30b21f5274a34c68f3ef580b332dfa9b
SHA256abbc4a923aa47c3046c5b62d063a81764d41edadc405c14d4e653244ef7065ba
SHA512fa0ef7be01f178979d40fa434b2d0c510bbf6df48229dbe953c9163a0811d87dfd093593c68b626c124d12ffdbda22fb0a193feb7f88cd41fc169fdb34a9813c
-
Filesize
135KB
MD5514a3a85667515260ec4585c421bee17
SHA1829f595b30b21f5274a34c68f3ef580b332dfa9b
SHA256abbc4a923aa47c3046c5b62d063a81764d41edadc405c14d4e653244ef7065ba
SHA512fa0ef7be01f178979d40fa434b2d0c510bbf6df48229dbe953c9163a0811d87dfd093593c68b626c124d12ffdbda22fb0a193feb7f88cd41fc169fdb34a9813c
-
Filesize
135KB
MD509a4ba713536f342faa750e8a9e34d18
SHA15ecdb36c9885ab3449aa8f2c5db971efdf3b0ffa
SHA256621e4bbccdbce379019e968e6a1dec91578a9c085aad1e87bcd5388b51fd0dca
SHA5128489bf7dc2e2f2fbfb09e6179f17bb750e0ca125b118da44fa774a24c3c36de8aa4880d1b1ef11682ddc7b0a82d02fc510c110f2f3e9556ff159e4b465634f01