Analysis
-
max time kernel
11s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
22/10/2023, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.a2d8d66b20110ee8e24ca7ce35d848f0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.a2d8d66b20110ee8e24ca7ce35d848f0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.a2d8d66b20110ee8e24ca7ce35d848f0.exe
-
Size
92KB
-
MD5
a2d8d66b20110ee8e24ca7ce35d848f0
-
SHA1
bebfcc64e890414b3af1482f44423f0ad8dc706b
-
SHA256
c237b777e95c36d948dc908f4176e0b36d43f5921bf707ee6aa799ebeac30d8c
-
SHA512
f50b33db685f2963115ef1646262ae8462edad8a7af5369e1eb7267a6f94ba63fff9cfdfda59c7b4a9149a19006a5f2a869bcf524174f0727765d8390f5b38d1
-
SSDEEP
1536:hTdbsA6zsp5dCwUKlwI/46xnuoYljXq+66DFUABABOVLefE3:/Z6GCwUKlV/42nuoYlj6+JB8M3
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad NEAS.a2d8d66b20110ee8e24ca7ce35d848f0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" NEAS.a2d8d66b20110ee8e24ca7ce35d848f0.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nlfmbibo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nlfmbibo.exe -
Executes dropped EXE 1 IoCs
pid Process 2184 Nlfmbibo.exe -
Loads dropped DLL 2 IoCs
pid Process 1224 NEAS.a2d8d66b20110ee8e24ca7ce35d848f0.exe 1224 NEAS.a2d8d66b20110ee8e24ca7ce35d848f0.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Nlfmbibo.exe NEAS.a2d8d66b20110ee8e24ca7ce35d848f0.exe File opened for modification C:\Windows\SysWOW64\Nlfmbibo.exe NEAS.a2d8d66b20110ee8e24ca7ce35d848f0.exe File created C:\Windows\SysWOW64\Eemjkkbq.dll NEAS.a2d8d66b20110ee8e24ca7ce35d848f0.exe File created C:\Windows\SysWOW64\Ffaaoh32.exe Nlfmbibo.exe File opened for modification C:\Windows\SysWOW64\Ffaaoh32.exe Nlfmbibo.exe File created C:\Windows\SysWOW64\Fdkehipd.dll Nlfmbibo.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} NEAS.a2d8d66b20110ee8e24ca7ce35d848f0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eemjkkbq.dll" NEAS.a2d8d66b20110ee8e24ca7ce35d848f0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" NEAS.a2d8d66b20110ee8e24ca7ce35d848f0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 NEAS.a2d8d66b20110ee8e24ca7ce35d848f0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID NEAS.a2d8d66b20110ee8e24ca7ce35d848f0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nlfmbibo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdkehipd.dll" Nlfmbibo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nlfmbibo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node NEAS.a2d8d66b20110ee8e24ca7ce35d848f0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1224 wrote to memory of 2184 1224 NEAS.a2d8d66b20110ee8e24ca7ce35d848f0.exe 28 PID 1224 wrote to memory of 2184 1224 NEAS.a2d8d66b20110ee8e24ca7ce35d848f0.exe 28 PID 1224 wrote to memory of 2184 1224 NEAS.a2d8d66b20110ee8e24ca7ce35d848f0.exe 28 PID 1224 wrote to memory of 2184 1224 NEAS.a2d8d66b20110ee8e24ca7ce35d848f0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.a2d8d66b20110ee8e24ca7ce35d848f0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.a2d8d66b20110ee8e24ca7ce35d848f0.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\Nlfmbibo.exeC:\Windows\system32\Nlfmbibo.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5f4b64ea9ad133989db1700be779db3bb
SHA1c7e1c5091c600e4bc8b47891a4b56dc08dbee53e
SHA25673c2b9860fca6179fa37eebb5f47ccf46fa1d5e1afbc18ce2c971e23d504b14d
SHA5126521c797cc3771ff8d8b17e6fa0f86bc722cff4e78245865f3fc110b9fff9dfe07ceef861eb71a1ec42c188d1a630273996eafc11499f05ec57cd7db8ed1c4d8
-
Filesize
92KB
MD5f4b64ea9ad133989db1700be779db3bb
SHA1c7e1c5091c600e4bc8b47891a4b56dc08dbee53e
SHA25673c2b9860fca6179fa37eebb5f47ccf46fa1d5e1afbc18ce2c971e23d504b14d
SHA5126521c797cc3771ff8d8b17e6fa0f86bc722cff4e78245865f3fc110b9fff9dfe07ceef861eb71a1ec42c188d1a630273996eafc11499f05ec57cd7db8ed1c4d8
-
Filesize
92KB
MD5f4b64ea9ad133989db1700be779db3bb
SHA1c7e1c5091c600e4bc8b47891a4b56dc08dbee53e
SHA25673c2b9860fca6179fa37eebb5f47ccf46fa1d5e1afbc18ce2c971e23d504b14d
SHA5126521c797cc3771ff8d8b17e6fa0f86bc722cff4e78245865f3fc110b9fff9dfe07ceef861eb71a1ec42c188d1a630273996eafc11499f05ec57cd7db8ed1c4d8
-
Filesize
92KB
MD5f4b64ea9ad133989db1700be779db3bb
SHA1c7e1c5091c600e4bc8b47891a4b56dc08dbee53e
SHA25673c2b9860fca6179fa37eebb5f47ccf46fa1d5e1afbc18ce2c971e23d504b14d
SHA5126521c797cc3771ff8d8b17e6fa0f86bc722cff4e78245865f3fc110b9fff9dfe07ceef861eb71a1ec42c188d1a630273996eafc11499f05ec57cd7db8ed1c4d8
-
Filesize
92KB
MD5f4b64ea9ad133989db1700be779db3bb
SHA1c7e1c5091c600e4bc8b47891a4b56dc08dbee53e
SHA25673c2b9860fca6179fa37eebb5f47ccf46fa1d5e1afbc18ce2c971e23d504b14d
SHA5126521c797cc3771ff8d8b17e6fa0f86bc722cff4e78245865f3fc110b9fff9dfe07ceef861eb71a1ec42c188d1a630273996eafc11499f05ec57cd7db8ed1c4d8