Analysis
-
max time kernel
151s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2023, 17:16
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2d56d2ff081e30abde775279949a5f30.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2d56d2ff081e30abde775279949a5f30.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2d56d2ff081e30abde775279949a5f30.exe
-
Size
484KB
-
MD5
2d56d2ff081e30abde775279949a5f30
-
SHA1
a7e9f8b535d5e658988e3b5a1ce201a1cdfe6324
-
SHA256
3e8079f63a1943a5414921db3576e315ca688f45f658ec78fb85ef226d68dd12
-
SHA512
7ef7261ebdce58debd81738d9f460d1d521aea80710048d6874a398112c4a6209ed314272fee20c5170c1eed02a460260a37391c8d4692f3cfdabcd639d5929b
-
SSDEEP
12288:fLPkCDt1EG2XVekhdeTXX3kF1CWwH8k1ZklkpoZ:fLPkQ1bqAk1CpckfklNZ
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 376 DWWItutl.exe 4700 Compdate.exe 836 ~3812.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mshtdial = "C:\\Users\\Admin\\AppData\\Roaming\\logaHost\\DWWItutl.exe" NEAS.2d56d2ff081e30abde775279949a5f30.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Compdate.exe NEAS.2d56d2ff081e30abde775279949a5f30.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3928 4164 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 376 DWWItutl.exe 376 DWWItutl.exe 4700 Compdate.exe 4700 Compdate.exe 3220 Explorer.EXE 3220 Explorer.EXE 4700 Compdate.exe 4700 Compdate.exe 3220 Explorer.EXE 3220 Explorer.EXE 4700 Compdate.exe 4700 Compdate.exe 3220 Explorer.EXE 3220 Explorer.EXE 4700 Compdate.exe 4700 Compdate.exe 3220 Explorer.EXE 3220 Explorer.EXE 4700 Compdate.exe 4700 Compdate.exe 3220 Explorer.EXE 3220 Explorer.EXE 4700 Compdate.exe 4700 Compdate.exe 3220 Explorer.EXE 3220 Explorer.EXE 4700 Compdate.exe 4700 Compdate.exe 3220 Explorer.EXE 3220 Explorer.EXE 4700 Compdate.exe 4700 Compdate.exe 3220 Explorer.EXE 3220 Explorer.EXE 4700 Compdate.exe 4700 Compdate.exe 3220 Explorer.EXE 3220 Explorer.EXE 4700 Compdate.exe 4700 Compdate.exe 3220 Explorer.EXE 3220 Explorer.EXE 4700 Compdate.exe 4700 Compdate.exe 3220 Explorer.EXE 3220 Explorer.EXE 4700 Compdate.exe 4700 Compdate.exe 3220 Explorer.EXE 3220 Explorer.EXE 4700 Compdate.exe 4700 Compdate.exe 3220 Explorer.EXE 3220 Explorer.EXE 4700 Compdate.exe 4700 Compdate.exe 3220 Explorer.EXE 3220 Explorer.EXE 4700 Compdate.exe 4700 Compdate.exe 3220 Explorer.EXE 3220 Explorer.EXE 4700 Compdate.exe 4700 Compdate.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3220 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 376 DWWItutl.exe Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3220 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4164 wrote to memory of 376 4164 NEAS.2d56d2ff081e30abde775279949a5f30.exe 86 PID 4164 wrote to memory of 376 4164 NEAS.2d56d2ff081e30abde775279949a5f30.exe 86 PID 4164 wrote to memory of 376 4164 NEAS.2d56d2ff081e30abde775279949a5f30.exe 86 PID 376 wrote to memory of 836 376 DWWItutl.exe 89 PID 376 wrote to memory of 836 376 DWWItutl.exe 89 PID 836 wrote to memory of 3220 836 ~3812.tmp 55
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\NEAS.2d56d2ff081e30abde775279949a5f30.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2d56d2ff081e30abde775279949a5f30.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Roaming\logaHost\DWWItutl.exe"C:\Users\Admin\AppData\Roaming\logaHost"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\~3812.tmp3220 496136 376 14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:836
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 6203⤵
- Program crash
PID:3928
-
-
-
C:\Windows\SysWOW64\Compdate.exeC:\Windows\SysWOW64\Compdate.exe -s1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4164 -ip 41641⤵PID:5028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5aac3165ece2959f39ff98334618d10d9
SHA1020a191bfdc70c1fbd3bf74cd7479258bd197f51
SHA25696fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974
SHA5129eb876812a6a13dd4b090788c2b1d9e9a2e25370598ed5c040f82e6f378edc4b78d58bc8f60d5a559ea57b1edcf3a144bfe09454a9928997173db8279d5b40cf
-
Filesize
8KB
MD5aac3165ece2959f39ff98334618d10d9
SHA1020a191bfdc70c1fbd3bf74cd7479258bd197f51
SHA25696fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974
SHA5129eb876812a6a13dd4b090788c2b1d9e9a2e25370598ed5c040f82e6f378edc4b78d58bc8f60d5a559ea57b1edcf3a144bfe09454a9928997173db8279d5b40cf
-
Filesize
484KB
MD50325576f2174e4debf4f05b4c064964a
SHA19cdfe8598085f67e5858c3015e673081cdcd19c7
SHA256542adb32e36b640ac21cf062765bf765bc165a26152a2b235ff482490d4fc42e
SHA512c67fd1da8836d4b6c4e3d9903c3ad9b814c3a1473051c257e5278940449620347cdc45625262938e71ce81d61cce238648386e964f12356706c90f79a9e950a4
-
Filesize
484KB
MD50325576f2174e4debf4f05b4c064964a
SHA19cdfe8598085f67e5858c3015e673081cdcd19c7
SHA256542adb32e36b640ac21cf062765bf765bc165a26152a2b235ff482490d4fc42e
SHA512c67fd1da8836d4b6c4e3d9903c3ad9b814c3a1473051c257e5278940449620347cdc45625262938e71ce81d61cce238648386e964f12356706c90f79a9e950a4
-
Filesize
484KB
MD50325576f2174e4debf4f05b4c064964a
SHA19cdfe8598085f67e5858c3015e673081cdcd19c7
SHA256542adb32e36b640ac21cf062765bf765bc165a26152a2b235ff482490d4fc42e
SHA512c67fd1da8836d4b6c4e3d9903c3ad9b814c3a1473051c257e5278940449620347cdc45625262938e71ce81d61cce238648386e964f12356706c90f79a9e950a4
-
Filesize
484KB
MD50325576f2174e4debf4f05b4c064964a
SHA19cdfe8598085f67e5858c3015e673081cdcd19c7
SHA256542adb32e36b640ac21cf062765bf765bc165a26152a2b235ff482490d4fc42e
SHA512c67fd1da8836d4b6c4e3d9903c3ad9b814c3a1473051c257e5278940449620347cdc45625262938e71ce81d61cce238648386e964f12356706c90f79a9e950a4