Analysis
-
max time kernel
118s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
28-10-2023 19:55
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.63b30c9b43dbf2d523421350bfec0cd0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.63b30c9b43dbf2d523421350bfec0cd0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.63b30c9b43dbf2d523421350bfec0cd0.exe
-
Size
117KB
-
MD5
63b30c9b43dbf2d523421350bfec0cd0
-
SHA1
a1d508b33f18675a36f8d3a93991b5e4a8a988b9
-
SHA256
f99c428437782768906e67eb3f85817513c83fc504d6145fac32326a022cf4ec
-
SHA512
6bd7cebb489294e66a34cfb07982b34e36b0dcb20fc9dfc5c31f1ce2cc8c8c15c61171ae7c94aaec504c6e9a0e213fc4d47e18c42afc6e080967393ea95a4f8a
-
SSDEEP
3072:OE9j8b3ZXgKC1hX//iASOXRJzDOD26j/3Dc3p:OEebiKuX//iZOXRJ3OD26j8p
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2752 smss.exe -
Loads dropped DLL 2 IoCs
pid Process 1732 NEAS.63b30c9b43dbf2d523421350bfec0cd0.exe 1732 NEAS.63b30c9b43dbf2d523421350bfec0cd0.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe NEAS.63b30c9b43dbf2d523421350bfec0cd0.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1944 sc.exe 2708 sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1732 NEAS.63b30c9b43dbf2d523421350bfec0cd0.exe 2752 smss.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1944 1732 NEAS.63b30c9b43dbf2d523421350bfec0cd0.exe 28 PID 1732 wrote to memory of 1944 1732 NEAS.63b30c9b43dbf2d523421350bfec0cd0.exe 28 PID 1732 wrote to memory of 1944 1732 NEAS.63b30c9b43dbf2d523421350bfec0cd0.exe 28 PID 1732 wrote to memory of 1944 1732 NEAS.63b30c9b43dbf2d523421350bfec0cd0.exe 28 PID 1732 wrote to memory of 2752 1732 NEAS.63b30c9b43dbf2d523421350bfec0cd0.exe 30 PID 1732 wrote to memory of 2752 1732 NEAS.63b30c9b43dbf2d523421350bfec0cd0.exe 30 PID 1732 wrote to memory of 2752 1732 NEAS.63b30c9b43dbf2d523421350bfec0cd0.exe 30 PID 1732 wrote to memory of 2752 1732 NEAS.63b30c9b43dbf2d523421350bfec0cd0.exe 30 PID 2752 wrote to memory of 2708 2752 smss.exe 31 PID 2752 wrote to memory of 2708 2752 smss.exe 31 PID 2752 wrote to memory of 2708 2752 smss.exe 31 PID 2752 wrote to memory of 2708 2752 smss.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.63b30c9b43dbf2d523421350bfec0cd0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.63b30c9b43dbf2d523421350bfec0cd0.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
PID:1944
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
PID:2708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD57499ea138cfdcc3e5f519b0422b4e060
SHA1c3421f52f01da98d2425aaeb94c6c5836de3501e
SHA2564f17fcbde2e379afb5cac0a2306af73aca7354f0fa27c01f1479f0eaa7ed20b6
SHA5123a88ebd2db7a6d85fa437a886dd2abf5bd004d23b6e514a8313ef4564e015c720494e4028d632c89b6bac51ac4c12d88a6abeb901fbb6be2a65d444dcc1cf8e6
-
Filesize
117KB
MD57499ea138cfdcc3e5f519b0422b4e060
SHA1c3421f52f01da98d2425aaeb94c6c5836de3501e
SHA2564f17fcbde2e379afb5cac0a2306af73aca7354f0fa27c01f1479f0eaa7ed20b6
SHA5123a88ebd2db7a6d85fa437a886dd2abf5bd004d23b6e514a8313ef4564e015c720494e4028d632c89b6bac51ac4c12d88a6abeb901fbb6be2a65d444dcc1cf8e6
-
Filesize
117KB
MD57499ea138cfdcc3e5f519b0422b4e060
SHA1c3421f52f01da98d2425aaeb94c6c5836de3501e
SHA2564f17fcbde2e379afb5cac0a2306af73aca7354f0fa27c01f1479f0eaa7ed20b6
SHA5123a88ebd2db7a6d85fa437a886dd2abf5bd004d23b6e514a8313ef4564e015c720494e4028d632c89b6bac51ac4c12d88a6abeb901fbb6be2a65d444dcc1cf8e6
-
Filesize
117KB
MD57499ea138cfdcc3e5f519b0422b4e060
SHA1c3421f52f01da98d2425aaeb94c6c5836de3501e
SHA2564f17fcbde2e379afb5cac0a2306af73aca7354f0fa27c01f1479f0eaa7ed20b6
SHA5123a88ebd2db7a6d85fa437a886dd2abf5bd004d23b6e514a8313ef4564e015c720494e4028d632c89b6bac51ac4c12d88a6abeb901fbb6be2a65d444dcc1cf8e6
-
Filesize
117KB
MD57499ea138cfdcc3e5f519b0422b4e060
SHA1c3421f52f01da98d2425aaeb94c6c5836de3501e
SHA2564f17fcbde2e379afb5cac0a2306af73aca7354f0fa27c01f1479f0eaa7ed20b6
SHA5123a88ebd2db7a6d85fa437a886dd2abf5bd004d23b6e514a8313ef4564e015c720494e4028d632c89b6bac51ac4c12d88a6abeb901fbb6be2a65d444dcc1cf8e6