Analysis
-
max time kernel
173s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2023 17:16
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe
-
Size
135KB
-
MD5
2c93c6014e7e24b2253a91a0ed3e5b20
-
SHA1
ee0dd1e6cf351e1feca39e69cb4896a0d8dbf0bc
-
SHA256
cd2f9988b46cefad6e96badc9e7018805c62af56a616c3d7200a3bec7ab86320
-
SHA512
139518c9fb860b5feda545fe3aad5601f2a9d09cbf5cf35e8148609cde42afde52bd6be403956bdc06080667e8b8df03084a4408f12b0af4811f012582da10a2
-
SSDEEP
1536:4fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVgyO:4VqoCl/YgjxEufVU0TbTyDDalayO
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1456 explorer.exe 660 spoolsv.exe 3576 svchost.exe 2116 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe 1456 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1456 explorer.exe 3576 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 1456 explorer.exe 1456 explorer.exe 660 spoolsv.exe 660 spoolsv.exe 3576 svchost.exe 3576 svchost.exe 2116 spoolsv.exe 2116 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4412 wrote to memory of 1456 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 87 PID 4412 wrote to memory of 1456 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 87 PID 4412 wrote to memory of 1456 4412 NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe 87 PID 1456 wrote to memory of 660 1456 explorer.exe 89 PID 1456 wrote to memory of 660 1456 explorer.exe 89 PID 1456 wrote to memory of 660 1456 explorer.exe 89 PID 660 wrote to memory of 3576 660 spoolsv.exe 90 PID 660 wrote to memory of 3576 660 spoolsv.exe 90 PID 660 wrote to memory of 3576 660 spoolsv.exe 90 PID 3576 wrote to memory of 2116 3576 svchost.exe 91 PID 3576 wrote to memory of 2116 3576 svchost.exe 91 PID 3576 wrote to memory of 2116 3576 svchost.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2c93c6014e7e24b2253a91a0ed3e5b20.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4412 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1456 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:660 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3576 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2116
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD598f21637f97509f3f4197ae802c69a47
SHA1488e3457b03291afae91033f5a82ddf96d3d6599
SHA2569c351415e3b6a134933908ea9efbcfd7d286a05a69288d76326bc4fb4ff3817a
SHA5124a27b738e46d251e8a8bccbab46adcafe58cbd6d9fed9b1c00e74bf39794fc8c0be37bb6b457acf2f09cdd7e0f3d138c3ed2ed7eee23190f6da0301f3b18d70d
-
Filesize
135KB
MD5f6f6d41d50700c45cdb52d3b1ec009ed
SHA1258af417154ae73b3b2bef945c12534ee021adaa
SHA25610284351c336ec9dce41bb2e7b516fc1009a88c626d4aa763247d777f50da658
SHA5120aaae5bd32070d51350f24a459dda5f8cdecf1dca65eec625af77ca334427bf4da9b4fdc722ca926ad598d586038d39da62105edd09fbf583717246d56ecaff7
-
Filesize
135KB
MD5f6f6d41d50700c45cdb52d3b1ec009ed
SHA1258af417154ae73b3b2bef945c12534ee021adaa
SHA25610284351c336ec9dce41bb2e7b516fc1009a88c626d4aa763247d777f50da658
SHA5120aaae5bd32070d51350f24a459dda5f8cdecf1dca65eec625af77ca334427bf4da9b4fdc722ca926ad598d586038d39da62105edd09fbf583717246d56ecaff7
-
Filesize
135KB
MD5f6f6d41d50700c45cdb52d3b1ec009ed
SHA1258af417154ae73b3b2bef945c12534ee021adaa
SHA25610284351c336ec9dce41bb2e7b516fc1009a88c626d4aa763247d777f50da658
SHA5120aaae5bd32070d51350f24a459dda5f8cdecf1dca65eec625af77ca334427bf4da9b4fdc722ca926ad598d586038d39da62105edd09fbf583717246d56ecaff7
-
Filesize
135KB
MD550a5286929771a30453b899a76ef1a8a
SHA1a3891688e98060eaa494f0de17e1cc7624ed8e32
SHA256985dc5873a0789b6d80b79f9eb12eec17b653150a29ad824a8a87817741a0770
SHA5123a227e471ba4baa9062ed97c6e0493d8aed1b938b84674288ac63a704ba791b77df312000122f21094c1c5ae2824553b4108907b4efdd6a601d495cfa6fffe1d
-
Filesize
135KB
MD5f6f6d41d50700c45cdb52d3b1ec009ed
SHA1258af417154ae73b3b2bef945c12534ee021adaa
SHA25610284351c336ec9dce41bb2e7b516fc1009a88c626d4aa763247d777f50da658
SHA5120aaae5bd32070d51350f24a459dda5f8cdecf1dca65eec625af77ca334427bf4da9b4fdc722ca926ad598d586038d39da62105edd09fbf583717246d56ecaff7
-
Filesize
135KB
MD550a5286929771a30453b899a76ef1a8a
SHA1a3891688e98060eaa494f0de17e1cc7624ed8e32
SHA256985dc5873a0789b6d80b79f9eb12eec17b653150a29ad824a8a87817741a0770
SHA5123a227e471ba4baa9062ed97c6e0493d8aed1b938b84674288ac63a704ba791b77df312000122f21094c1c5ae2824553b4108907b4efdd6a601d495cfa6fffe1d
-
Filesize
135KB
MD598f21637f97509f3f4197ae802c69a47
SHA1488e3457b03291afae91033f5a82ddf96d3d6599
SHA2569c351415e3b6a134933908ea9efbcfd7d286a05a69288d76326bc4fb4ff3817a
SHA5124a27b738e46d251e8a8bccbab46adcafe58cbd6d9fed9b1c00e74bf39794fc8c0be37bb6b457acf2f09cdd7e0f3d138c3ed2ed7eee23190f6da0301f3b18d70d