Analysis
-
max time kernel
58s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
22/10/2023, 17:21
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.716a71520fa639d55468d6f922470670.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.716a71520fa639d55468d6f922470670.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.716a71520fa639d55468d6f922470670.exe
-
Size
42KB
-
MD5
716a71520fa639d55468d6f922470670
-
SHA1
06eef4f37e7e6f441b39b3dfc4538ec880b33163
-
SHA256
9a9609eb913e831f14279a1565d22efaa5ead119a3b49703651c459b97908e40
-
SHA512
5c59c9f367277eca6358e0a7dfc229cd6dceca33ca58bfe300ad80002bd003daa15a186441d6618f20ae8b8154be14a89df87712e9cdbff62aeadbd8a8c079ec
-
SSDEEP
768:C/+8ldkxYXO5lsvhBznbcuyD7UTy3wy3BEywe00:6+8ldkxOO5Sv/znouy8Tuzuw
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" NEAS.716a71520fa639d55468d6f922470670.exe -
Sets file execution options in registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe NEAS.716a71520fa639d55468d6f922470670.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe\Debugger = "C:\\WINDOWS\\Fonts.exe" NEAS.716a71520fa639d55468d6f922470670.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dxdiag.exe NEAS.716a71520fa639d55468d6f922470670.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dxdiag.exe\Debugger = "C:\\WINDOWS\\Fonts.exe" NEAS.716a71520fa639d55468d6f922470670.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe NEAS.716a71520fa639d55468d6f922470670.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "C:\\WINDOWS\\Fonts.exe" NEAS.716a71520fa639d55468d6f922470670.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe NEAS.716a71520fa639d55468d6f922470670.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "C:\\WINDOWS\\Fonts.exe" NEAS.716a71520fa639d55468d6f922470670.exe -
Drops file in Program Files directory 42 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Common Files.exe NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Internet Explorer.exe NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\VideoLAN NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Windows NT.exe NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Common Files NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Java NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Reference Assemblies NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Windows Journal NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Mozilla Firefox NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Reference Assemblies.exe NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Windows Media Player.exe NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Windows Photo Viewer.exe NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Windows Journal.exe NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Windows Mail.exe NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\7-Zip.exe NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Google.exe NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Google NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Internet Explorer NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Microsoft Games NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\MSBuild.exe NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Windows Photo Viewer NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Windows Defender NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Windows Media Player NEAS.716a71520fa639d55468d6f922470670.exe File created C:\Program Files\Thumbs.db NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\DVD Maker.exe NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\DVD Maker NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Java.exe NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Microsoft Games.exe NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Microsoft Office.exe NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Windows NT NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Windows Portable Devices.exe NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Windows Defender.exe NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Windows Portable Devices NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Windows Sidebar.exe NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Thumbs.db NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Mozilla Firefox.exe NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\MSBuild NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\VideoLAN.exe NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Windows Mail NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Microsoft Office NEAS.716a71520fa639d55468d6f922470670.exe File opened for modification C:\Program Files\Windows Sidebar NEAS.716a71520fa639d55468d6f922470670.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\Fonts.exe NEAS.716a71520fa639d55468d6f922470670.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe -
Modifies registry class 37 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4a00310000000000565708a5102054656d700000360008000400efbe1f5783ad565708a52a000000ff010000000002000000000000000000000000000000540065006d007000000014000000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4c003100000000001f5751b4100041646d696e00380008000400efbe1f5783ad1f5751b42a00000030000000000004000000000000000000000000000000410064006d0069006e00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 4c003100000000001f5772b010204c6f63616c00380008000400efbe1f5783ad1f5772b02a000000fe0100000000020000000000000000000000000000004c006f00630061006c00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 = 9200310000000000565708a512004e4541537e312e3731360000780008000400efbe565708a5565708a52a000000d035010000000e0000000000000000000000000000004e004500410053002e003700310036006100370031003500320030006600610036003300390064003500350034003600380064003600660039003200320034003700300036003700300000001a000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 74003100000000001f5783ad1100557365727300600008000400efbeee3a851a1f5783ad2a000000e601000000000100000000000000000036000000000055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 52003100000000001f5783ad122041707044617461003c0008000400efbe1f5783ad1f5783ad2a000000eb0100000000020000000000000000000000000000004100700070004400610074006100000016000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2744 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2568 NEAS.716a71520fa639d55468d6f922470670.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2568 NEAS.716a71520fa639d55468d6f922470670.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2568 wrote to memory of 3036 2568 NEAS.716a71520fa639d55468d6f922470670.exe 28 PID 2568 wrote to memory of 3036 2568 NEAS.716a71520fa639d55468d6f922470670.exe 28 PID 2568 wrote to memory of 3036 2568 NEAS.716a71520fa639d55468d6f922470670.exe 28 PID 2568 wrote to memory of 3036 2568 NEAS.716a71520fa639d55468d6f922470670.exe 28 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer NEAS.716a71520fa639d55468d6f922470670.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" NEAS.716a71520fa639d55468d6f922470670.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.716a71520fa639d55468d6f922470670.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.716a71520fa639d55468d6f922470670.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Sets file execution options in registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2568 -
C:\Windows\SysWOW64\Explorer.exeExplorer C:\Users\Admin\AppData\Local\Temp\NEAS.716a71520fa639d55468d6f9224706702⤵PID:3036
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD53579c8da7f1e0ad94656e76c886e5125
SHA183eb531bfd10f917770441c7f548dcd841e70fdd
SHA256b08022d315cf1eb12d2665bded0e6af40653c0a0be975232fb49bcbd021cfc36
SHA5123493fa6334931c1e41e0e9d0621949c8bfd33c72811b3407e47c17fb55864a0710ae094bb0d547f19ec23d7626f04fe620ed478ada1d88e6647794063036388d
-
Filesize
42KB
MD5ac5986d0470551b57780c13446f9e632
SHA1bd8e07490c11bb1d2557b75e65f8a44464965b88
SHA256b5ca4e5ed01ca5f8c69081b76b8bac4d729cd8a955c52ebce30fe8bdf3eb99d3
SHA5128eb87f92127555c79be9bf98ddcec48aae2e2edfda81caaf367acae2ce597b1379966955b2ba450ed28e528020e9a580e87bccdbdaacdce79261eaf381cb1dfa
-
Filesize
25KB
MD5cb43db3323b1afca8c1e27fb46a923d4
SHA18dccbddabbae20f9dba2ff271c45898942a4e0c2
SHA2568ae3066db43aafe86d9ff9052e463f11b0b53a23ce218e1cf6e7f09cf5c9b411
SHA5126e0148c8ac03e64cd5e320a7d0490d8697240cebf2973bfdee719bca5f3bc944bb802fabb1d18eb14c38dbf99ab6d154837b5a46e2204332948e8171e0eebf1d
-
Filesize
22B
MD576cdb2bad9582d23c1f6f4d868218d6c
SHA1b04f3ee8f5e43fa3b162981b50bb72fe1acabb33
SHA2568739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85
SHA5125e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f