Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
23/10/2023, 21:12
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.e819264d61ce63b4944dd9590f251490_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.e819264d61ce63b4944dd9590f251490_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.e819264d61ce63b4944dd9590f251490_JC.exe
-
Size
464KB
-
MD5
e819264d61ce63b4944dd9590f251490
-
SHA1
372e81a36cc9d4af8384781e897e77d60ac6f36c
-
SHA256
8586d00273940e3a67b744a4a8280aa051ea7f4c1a52ecbf63a9c2e08e86f865
-
SHA512
f9394c892b50d5b8c63e972c16da4c706625f46365bf54d3fea9c7dcc73f19aae09ce6f16ace8e13d648af1ff61349ecaf962d5259749731eaca2b76a3a1d8c1
-
SSDEEP
6144:/pW2bgbbV28okoS1oWMkdlZQ5iioc+npLspl8uXH:/pW2IoioS6KCX
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Disables Task Manager via registry modification
-
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.e819264d61ce63b4944dd9590f251490_JC.exe BATCF %1" NEAS.e819264d61ce63b4944dd9590f251490_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.e819264d61ce63b4944dd9590f251490_JC.exe NTPAD %1" NEAS.e819264d61ce63b4944dd9590f251490_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\pngfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.e819264d61ce63b4944dd9590f251490_JC.exe JPGIF %1" NEAS.e819264d61ce63b4944dd9590f251490_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\giffile\shell\Open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.e819264d61ce63b4944dd9590f251490_JC.exe JPGIF %1" NEAS.e819264d61ce63b4944dd9590f251490_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\icofile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.e819264d61ce63b4944dd9590f251490_JC.exe JPGIF %1" NEAS.e819264d61ce63b4944dd9590f251490_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\jpegfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.e819264d61ce63b4944dd9590f251490_JC.exe JPGIF %1" NEAS.e819264d61ce63b4944dd9590f251490_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\rtffile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.e819264d61ce63b4944dd9590f251490_JC.exe RTFDF %1" NEAS.e819264d61ce63b4944dd9590f251490_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inifile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.e819264d61ce63b4944dd9590f251490_JC.exe NTPAD %1" NEAS.e819264d61ce63b4944dd9590f251490_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.e819264d61ce63b4944dd9590f251490_JC.exe BATCF %1" NEAS.e819264d61ce63b4944dd9590f251490_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cmdfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.e819264d61ce63b4944dd9590f251490_JC.exe CMDSF %1" NEAS.e819264d61ce63b4944dd9590f251490_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.e819264d61ce63b4944dd9590f251490_JC.exe HTMWF %1" NEAS.e819264d61ce63b4944dd9590f251490_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.e819264d61ce63b4944dd9590f251490_JC.exe NTPAD %1" NEAS.e819264d61ce63b4944dd9590f251490_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.e819264d61ce63b4944dd9590f251490_JC.exe NTPAD %1" NEAS.e819264d61ce63b4944dd9590f251490_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.e819264d61ce63b4944dd9590f251490_JC.exe VBSSF %1" NEAS.e819264d61ce63b4944dd9590f251490_JC.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 2944 reg.exe 2964 reg.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2944 2424 NEAS.e819264d61ce63b4944dd9590f251490_JC.exe 28 PID 2424 wrote to memory of 2944 2424 NEAS.e819264d61ce63b4944dd9590f251490_JC.exe 28 PID 2424 wrote to memory of 2944 2424 NEAS.e819264d61ce63b4944dd9590f251490_JC.exe 28 PID 2424 wrote to memory of 2964 2424 NEAS.e819264d61ce63b4944dd9590f251490_JC.exe 30 PID 2424 wrote to memory of 2964 2424 NEAS.e819264d61ce63b4944dd9590f251490_JC.exe 30 PID 2424 wrote to memory of 2964 2424 NEAS.e819264d61ce63b4944dd9590f251490_JC.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.e819264d61ce63b4944dd9590f251490_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e819264d61ce63b4944dd9590f251490_JC.exe"1⤵
- Modifies system executable filetype association
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- UAC bypass
- Modifies registry key
PID:2944
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f2⤵
- Modifies registry key
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
464KB
MD58bac7c6191005ad52871bbd08c98ab7b
SHA1ba8ff2806a1b9d7a6ed70db7e9375f4c3785d4b6
SHA2567bcfba7977a0932295be23180eab9dc8c51fdfffd79dab8d8f33b11ca3bbbee3
SHA51263520ae449cb292ba4be5a2a729c3ea386db366b35777441b60616e5fcd184df69e56cfa0aaf80dc6430bc6c14db27a03177c333923da8d9fa4aea6a75a1d95b