Analysis
-
max time kernel
173s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
28/10/2023, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.3818c107f33a83e67d6aa1c187e68330.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.3818c107f33a83e67d6aa1c187e68330.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.3818c107f33a83e67d6aa1c187e68330.exe
-
Size
209KB
-
MD5
3818c107f33a83e67d6aa1c187e68330
-
SHA1
dda53fe23153da45d10bc9687402875b1eeb4679
-
SHA256
dfaceba3c3270c15a1ccc040a0e94e60ae0e9f7f5147e6b34f744ad3dc2b028a
-
SHA512
913a5d74c61116fc312ea777d751cd0cbea703eadc3bba8cee6972a76e78f23cf1dfdc1a5287729b43d7c7af0a5dcab31b883f256e3e21257fcf1a33b3facafa
-
SSDEEP
3072:AQcjk9tVRNIcjb4Ryfjijjx14hdeCXHKPJFo9zpE7Di0X0JuLL+o7BlpF9e:AQh9tVRm2kh34hdeCkcG7DEALLlnN
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2800 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2448 NEAS.3818c107f33a83e67d6aa1c187e68330.exe 2448 NEAS.3818c107f33a83e67d6aa1c187e68330.exe -
resource yara_rule behavioral1/memory/2448-1-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2448-16-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2800-17-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2800-39-0x0000000000400000-0x0000000000469000-memory.dmp upx -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\5e6364ce = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\5e6364ce = "C:\\Windows\\apppatch\\svchost.exe" NEAS.3818c107f33a83e67d6aa1c187e68330.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe NEAS.3818c107f33a83e67d6aa1c187e68330.exe File opened for modification C:\Windows\apppatch\svchost.exe NEAS.3818c107f33a83e67d6aa1c187e68330.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2448 NEAS.3818c107f33a83e67d6aa1c187e68330.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2800 2448 NEAS.3818c107f33a83e67d6aa1c187e68330.exe 28 PID 2448 wrote to memory of 2800 2448 NEAS.3818c107f33a83e67d6aa1c187e68330.exe 28 PID 2448 wrote to memory of 2800 2448 NEAS.3818c107f33a83e67d6aa1c187e68330.exe 28 PID 2448 wrote to memory of 2800 2448 NEAS.3818c107f33a83e67d6aa1c187e68330.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.3818c107f33a83e67d6aa1c187e68330.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.3818c107f33a83e67d6aa1c187e68330.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD52f308ba18eb75627e1d371e352014290
SHA183a39b76ce2875d6297e5306dafc5dcf1b616150
SHA25666155ad73a82f84598729b33520745c0cdf9cfe022fd8e391e583c347359207e
SHA51266ee716e87b9d72b8c9a2e6254a1e3ee4fe61eede0eecc22e6f76b5cb2b5aaf4c91fb993094312e221a84e325535cca93aa149aedf303b15f20b061d97b297f4
-
Filesize
209KB
MD52f308ba18eb75627e1d371e352014290
SHA183a39b76ce2875d6297e5306dafc5dcf1b616150
SHA25666155ad73a82f84598729b33520745c0cdf9cfe022fd8e391e583c347359207e
SHA51266ee716e87b9d72b8c9a2e6254a1e3ee4fe61eede0eecc22e6f76b5cb2b5aaf4c91fb993094312e221a84e325535cca93aa149aedf303b15f20b061d97b297f4
-
Filesize
209KB
MD52f308ba18eb75627e1d371e352014290
SHA183a39b76ce2875d6297e5306dafc5dcf1b616150
SHA25666155ad73a82f84598729b33520745c0cdf9cfe022fd8e391e583c347359207e
SHA51266ee716e87b9d72b8c9a2e6254a1e3ee4fe61eede0eecc22e6f76b5cb2b5aaf4c91fb993094312e221a84e325535cca93aa149aedf303b15f20b061d97b297f4
-
Filesize
209KB
MD52f308ba18eb75627e1d371e352014290
SHA183a39b76ce2875d6297e5306dafc5dcf1b616150
SHA25666155ad73a82f84598729b33520745c0cdf9cfe022fd8e391e583c347359207e
SHA51266ee716e87b9d72b8c9a2e6254a1e3ee4fe61eede0eecc22e6f76b5cb2b5aaf4c91fb993094312e221a84e325535cca93aa149aedf303b15f20b061d97b297f4
-
Filesize
209KB
MD52f308ba18eb75627e1d371e352014290
SHA183a39b76ce2875d6297e5306dafc5dcf1b616150
SHA25666155ad73a82f84598729b33520745c0cdf9cfe022fd8e391e583c347359207e
SHA51266ee716e87b9d72b8c9a2e6254a1e3ee4fe61eede0eecc22e6f76b5cb2b5aaf4c91fb993094312e221a84e325535cca93aa149aedf303b15f20b061d97b297f4