Analysis
-
max time kernel
161s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2023 20:18
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.ef206e773124bd5e3b9af8082b288090.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.ef206e773124bd5e3b9af8082b288090.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.ef206e773124bd5e3b9af8082b288090.exe
-
Size
1.2MB
-
MD5
ef206e773124bd5e3b9af8082b288090
-
SHA1
a4e88814141f006f41f03285c27bdbe833b478b9
-
SHA256
c6da1980b6e0076896d8920585bf6b60d5d9da6fdf4139c2db314324c9d1c2e4
-
SHA512
19f951ea4b08a00cecf34630dc49d32f08ef09867fb6c67535e10b8b6c8bf335ad9cdc2bf474a7f9eb3d9800105fe05a195cfd3292fc43dd030b8844c62324c9
-
SSDEEP
24576:Tj+cktriK2PVboYTicnT1SBb//wDKULTrhSFkOTu+FMd:+SPVboYTVABjRGtSFruNd
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4356 explorer.exe 4008 spoolsv.exe 1916 svchost.exe 3928 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 36 IoCs
pid Process 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4356 explorer.exe 4356 explorer.exe 4008 spoolsv.exe 1916 svchost.exe 1916 svchost.exe 4008 spoolsv.exe 3928 spoolsv.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4356 explorer.exe 1916 svchost.exe 4356 explorer.exe 1916 svchost.exe 4356 explorer.exe 1916 svchost.exe 4356 explorer.exe 1916 svchost.exe 4356 explorer.exe 1916 svchost.exe 4356 explorer.exe 1916 svchost.exe 4356 explorer.exe 1916 svchost.exe 4356 explorer.exe 1916 svchost.exe 4356 explorer.exe 1916 svchost.exe 4356 explorer.exe 1916 svchost.exe 4356 explorer.exe 1916 svchost.exe 4356 explorer.exe 1916 svchost.exe 4356 explorer.exe 1916 svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe NEAS.ef206e773124bd5e3b9af8082b288090.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4356 explorer.exe 1916 svchost.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 4356 explorer.exe 4356 explorer.exe 4356 explorer.exe 4008 spoolsv.exe 4008 spoolsv.exe 4008 spoolsv.exe 1916 svchost.exe 1916 svchost.exe 1916 svchost.exe 3928 spoolsv.exe 3928 spoolsv.exe 3928 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4064 wrote to memory of 4356 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 89 PID 4064 wrote to memory of 4356 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 89 PID 4064 wrote to memory of 4356 4064 NEAS.ef206e773124bd5e3b9af8082b288090.exe 89 PID 4356 wrote to memory of 4008 4356 explorer.exe 90 PID 4356 wrote to memory of 4008 4356 explorer.exe 90 PID 4356 wrote to memory of 4008 4356 explorer.exe 90 PID 4008 wrote to memory of 1916 4008 spoolsv.exe 91 PID 4008 wrote to memory of 1916 4008 spoolsv.exe 91 PID 4008 wrote to memory of 1916 4008 spoolsv.exe 91 PID 1916 wrote to memory of 3928 1916 svchost.exe 92 PID 1916 wrote to memory of 3928 1916 svchost.exe 92 PID 1916 wrote to memory of 3928 1916 svchost.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.ef206e773124bd5e3b9af8082b288090.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.ef206e773124bd5e3b9af8082b288090.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4064 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4356 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4008 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:3928
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5bb419ecc85bf5401a57901699cdcbdbb
SHA1a745fe2f8064248812c8b5ea44c7694a0890bfd3
SHA2565fdb354dcb449cf4d53980dcf8e778a25e0daad16f30579d5ea79e405ed82fd5
SHA512192cfc455ceaf2297034307ec259ef3a916a50f096b60017df5883b682a8aeaa97c60debb0d6a83b12e0db51617cd46b4d3840cffa75ae7b327c25cee821d736
-
Filesize
1.2MB
MD59641d743154f61dbda44b5ff2e496663
SHA1bf1873e285ea5f9a3ef1cd0fcaf1bc4e58cd0caa
SHA2567bf51f5bf0c1609700983e8f1d6524a08b8803e8ddc232f0e3ea698c418a22fa
SHA5128e77519a85bd91b63826ba7f11e0c81db3ecf4f64e57f1faa906bf7875b6d9c6f118c23370a0f906bc2d4ad80e7df1349d6e0792aaaa63f2a828fb6a7cce69f1
-
Filesize
1.2MB
MD59641d743154f61dbda44b5ff2e496663
SHA1bf1873e285ea5f9a3ef1cd0fcaf1bc4e58cd0caa
SHA2567bf51f5bf0c1609700983e8f1d6524a08b8803e8ddc232f0e3ea698c418a22fa
SHA5128e77519a85bd91b63826ba7f11e0c81db3ecf4f64e57f1faa906bf7875b6d9c6f118c23370a0f906bc2d4ad80e7df1349d6e0792aaaa63f2a828fb6a7cce69f1
-
Filesize
1.2MB
MD59641d743154f61dbda44b5ff2e496663
SHA1bf1873e285ea5f9a3ef1cd0fcaf1bc4e58cd0caa
SHA2567bf51f5bf0c1609700983e8f1d6524a08b8803e8ddc232f0e3ea698c418a22fa
SHA5128e77519a85bd91b63826ba7f11e0c81db3ecf4f64e57f1faa906bf7875b6d9c6f118c23370a0f906bc2d4ad80e7df1349d6e0792aaaa63f2a828fb6a7cce69f1
-
Filesize
1.2MB
MD5df172b419d0bd2a9a472aa6b21a46811
SHA1cc1fb27dfe7882b12f4511ade8511d92509c16d9
SHA256cc59a3a3ddf44ee64136faa2e43edd6d589dcc980c47a204a8d99cee45b2c7af
SHA512e171452e74c23dbe21300ebb92af6b979001c5e03f8d98b97020e3b1290eb7d5566da2637ce2510f23b2deadde1113703b2f55fb5c7efc57b330d5a57e25f6a2
-
Filesize
1.2MB
MD59641d743154f61dbda44b5ff2e496663
SHA1bf1873e285ea5f9a3ef1cd0fcaf1bc4e58cd0caa
SHA2567bf51f5bf0c1609700983e8f1d6524a08b8803e8ddc232f0e3ea698c418a22fa
SHA5128e77519a85bd91b63826ba7f11e0c81db3ecf4f64e57f1faa906bf7875b6d9c6f118c23370a0f906bc2d4ad80e7df1349d6e0792aaaa63f2a828fb6a7cce69f1
-
Filesize
1.2MB
MD5df172b419d0bd2a9a472aa6b21a46811
SHA1cc1fb27dfe7882b12f4511ade8511d92509c16d9
SHA256cc59a3a3ddf44ee64136faa2e43edd6d589dcc980c47a204a8d99cee45b2c7af
SHA512e171452e74c23dbe21300ebb92af6b979001c5e03f8d98b97020e3b1290eb7d5566da2637ce2510f23b2deadde1113703b2f55fb5c7efc57b330d5a57e25f6a2
-
Filesize
1.2MB
MD5bb419ecc85bf5401a57901699cdcbdbb
SHA1a745fe2f8064248812c8b5ea44c7694a0890bfd3
SHA2565fdb354dcb449cf4d53980dcf8e778a25e0daad16f30579d5ea79e405ed82fd5
SHA512192cfc455ceaf2297034307ec259ef3a916a50f096b60017df5883b682a8aeaa97c60debb0d6a83b12e0db51617cd46b4d3840cffa75ae7b327c25cee821d736