Analysis
-
max time kernel
159s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 20:07
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe
-
Size
395KB
-
MD5
d25e8bd9849dc0ff1480b6a21df8c810
-
SHA1
e0c0b59a7db31bdfaae0ca5f16271a60fca45bc9
-
SHA256
2bfef15bc1bb1f0e062d305309ab363693ada9ece4e2dfdbcd9a25b3e3ce4f2e
-
SHA512
91dfa4f3d45a1862531bf3f8e00f4e2d0d19129f095609d81399b99a96a99d81028ce09f82fa4747b732f8690e671cc00a9d08d7efcd642d5a69be6ae4f71af6
-
SSDEEP
6144:Hx+u5A7Mfqr3joHqqIJYaHlUAEgasjCNl8S0M7+Mgpjhb27/zxOPs:R+upqsHqqNI25g/jKuM5gpNS
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe:*:enabled:@shell32.dll,-1" NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 264 sysmgr.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4" sysmgr.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\sysmgr.exe NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe File created C:\Windows\svc.dat NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe File opened for modification C:\WINDOWS\SYSMGR.EXE sysmgr.exe File opened for modification C:\Windows\conf.dat sysmgr.exe File created C:\Windows\conf.dat sysmgr.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe Token: SeTakeOwnershipPrivilege 264 sysmgr.exe Token: SeRestorePrivilege 264 sysmgr.exe Token: SeBackupPrivilege 264 sysmgr.exe Token: SeChangeNotifyPrivilege 264 sysmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 428 wrote to memory of 264 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 82 PID 428 wrote to memory of 264 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 82 PID 428 wrote to memory of 264 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 82 PID 428 wrote to memory of 632 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 2 PID 428 wrote to memory of 632 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 2 PID 428 wrote to memory of 632 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 2 PID 428 wrote to memory of 632 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 2 PID 428 wrote to memory of 632 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 2 PID 428 wrote to memory of 632 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 2 PID 428 wrote to memory of 684 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 5 PID 428 wrote to memory of 684 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 5 PID 428 wrote to memory of 684 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 5 PID 428 wrote to memory of 684 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 5 PID 428 wrote to memory of 684 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 5 PID 428 wrote to memory of 684 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 5 PID 428 wrote to memory of 780 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 25 PID 428 wrote to memory of 780 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 25 PID 428 wrote to memory of 780 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 25 PID 428 wrote to memory of 780 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 25 PID 428 wrote to memory of 780 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 25 PID 428 wrote to memory of 780 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 25 PID 428 wrote to memory of 788 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 19 PID 428 wrote to memory of 788 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 19 PID 428 wrote to memory of 788 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 19 PID 428 wrote to memory of 788 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 19 PID 428 wrote to memory of 788 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 19 PID 428 wrote to memory of 788 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 19 PID 428 wrote to memory of 800 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 18 PID 428 wrote to memory of 800 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 18 PID 428 wrote to memory of 800 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 18 PID 428 wrote to memory of 800 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 18 PID 428 wrote to memory of 800 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 18 PID 428 wrote to memory of 800 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 18 PID 428 wrote to memory of 920 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 17 PID 428 wrote to memory of 920 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 17 PID 428 wrote to memory of 920 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 17 PID 428 wrote to memory of 920 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 17 PID 428 wrote to memory of 920 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 17 PID 428 wrote to memory of 920 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 17 PID 428 wrote to memory of 972 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 9 PID 428 wrote to memory of 972 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 9 PID 428 wrote to memory of 972 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 9 PID 428 wrote to memory of 972 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 9 PID 428 wrote to memory of 972 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 9 PID 428 wrote to memory of 972 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 9 PID 428 wrote to memory of 340 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 8 PID 428 wrote to memory of 340 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 8 PID 428 wrote to memory of 340 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 8 PID 428 wrote to memory of 340 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 8 PID 428 wrote to memory of 340 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 8 PID 428 wrote to memory of 340 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 8 PID 428 wrote to memory of 548 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 11 PID 428 wrote to memory of 548 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 11 PID 428 wrote to memory of 548 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 11 PID 428 wrote to memory of 548 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 11 PID 428 wrote to memory of 548 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 11 PID 428 wrote to memory of 548 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 11 PID 428 wrote to memory of 608 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 10 PID 428 wrote to memory of 608 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 10 PID 428 wrote to memory of 608 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 10 PID 428 wrote to memory of 608 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 10 PID 428 wrote to memory of 608 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 10 PID 428 wrote to memory of 608 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 10 PID 428 wrote to memory of 1048 428 NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe 12
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:632
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:340
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:788
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:972
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:608
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:548
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1048
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1056
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1168
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1152
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2940
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1072
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:920
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:800
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:2544
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4072
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca2⤵PID:2732
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca2⤵PID:3124
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:4284
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:4188
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:4432
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4132
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4044
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:3780
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3988
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3748
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1228
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1340
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1420
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2760
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1360
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1288
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:780
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1568
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1632
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1576
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1700
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1728
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1800
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1820
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1916
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1924
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1972
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1992
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1620
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:1140
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2104
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2220
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2536
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2588
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2628
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2836
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2600
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2496
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:1528
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3312
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2420
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2380
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3564
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d25e8bd9849dc0ff1480b6a21df8c810_JC.exe"2⤵
- Modifies firewall policy service
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\sysmgr.exe"C:\Windows\sysmgr.exe"3⤵
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:264 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4776
-
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4460
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:5000
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:2252
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:2204
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:5024
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:3516
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:2692
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:2280
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2372
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD551c9759c479c8f0452e3d01ddc4f1319
SHA1d3c563f7c7c64767b6dc84030740ae981bbaae6d
SHA2561c7e3bebe8bcb6722a3b007ab630c8ff473aa6b2c81e608d1f4ae9faacd874ee
SHA5124a1798cc576cc77fb41ee7f72b58f1430c0484d06865554ceb5679c0796593f8a0ca396ff8af43f1ae55baeeee09545141bb0b56ca3663f9d191f71059fa1727
-
Filesize
36KB
MD52373dfbdba70b54164d4fe163f7f59f1
SHA1fbc51778f9e4868ddce4763d0bef4cb48090e3f6
SHA256e506e529d2d1d80ba433d4dec9fcbf07506112c8d0a130bed322f03346640456
SHA51232e48c596def05ddd1c987ae54cb069f750e0e4a993aa9f5c1d69e11c49ca90f6d324dfb4fa7c29c7d642eb2d939b2efe9332e0f4f4cbc5a0b2893adbf8598ec
-
Filesize
36KB
MD52373dfbdba70b54164d4fe163f7f59f1
SHA1fbc51778f9e4868ddce4763d0bef4cb48090e3f6
SHA256e506e529d2d1d80ba433d4dec9fcbf07506112c8d0a130bed322f03346640456
SHA51232e48c596def05ddd1c987ae54cb069f750e0e4a993aa9f5c1d69e11c49ca90f6d324dfb4fa7c29c7d642eb2d939b2efe9332e0f4f4cbc5a0b2893adbf8598ec