Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2023, 19:55
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.70ea1e771eb4d0eee0792ffa30bdde10.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.70ea1e771eb4d0eee0792ffa30bdde10.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.70ea1e771eb4d0eee0792ffa30bdde10.exe
-
Size
234KB
-
MD5
70ea1e771eb4d0eee0792ffa30bdde10
-
SHA1
4e79f2beffefcb140e72c978c28079231d4c1872
-
SHA256
81c5374a79ad066219e05ee447d65101024e6188d333701878c768338811f2b3
-
SHA512
e8f7fe13836688c394c26f2095b1ee0d83adb1085df6cd5f193facf9caa42fb0bd1bdf4f2e53efc067efa75996d43b3bc844a4539a3be3c7dce14fd6859a4e90
-
SSDEEP
6144:7ahWzc9wdYCkugfYfuTFu2LPTeKza4iDAqiEvnmTMZ/jL:7rc4YXQfek2LPVv4AqiEfGw
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3868 compfo32.exe 3368 ~9867.tmp 1892 DpiSSTAT.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\grpcunch = "C:\\Users\\Admin\\AppData\\Roaming\\provvate\\compfo32.exe" NEAS.70ea1e771eb4d0eee0792ffa30bdde10.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\DpiSSTAT.exe NEAS.70ea1e771eb4d0eee0792ffa30bdde10.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3868 compfo32.exe 3868 compfo32.exe 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3352 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 3868 compfo32.exe Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3352 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2796 wrote to memory of 3868 2796 NEAS.70ea1e771eb4d0eee0792ffa30bdde10.exe 89 PID 2796 wrote to memory of 3868 2796 NEAS.70ea1e771eb4d0eee0792ffa30bdde10.exe 89 PID 2796 wrote to memory of 3868 2796 NEAS.70ea1e771eb4d0eee0792ffa30bdde10.exe 89 PID 3868 wrote to memory of 3368 3868 compfo32.exe 91 PID 3868 wrote to memory of 3368 3868 compfo32.exe 91 PID 3368 wrote to memory of 3352 3368 ~9867.tmp 58
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\NEAS.70ea1e771eb4d0eee0792ffa30bdde10.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.70ea1e771eb4d0eee0792ffa30bdde10.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Roaming\provvate\compfo32.exe"C:\Users\Admin\AppData\Roaming\provvate"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\~9867.tmp3352 239624 3868 14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3368
-
-
-
-
C:\Windows\SysWOW64\DpiSSTAT.exeC:\Windows\SysWOW64\DpiSSTAT.exe -s1⤵
- Executes dropped EXE
PID:1892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD586dc243576cf5c7445451af37631eea9
SHA199a81c47c4c02f32c0ab456bfa23c306c7a09bf9
SHA25625d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a
SHA512c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4
-
Filesize
8KB
MD586dc243576cf5c7445451af37631eea9
SHA199a81c47c4c02f32c0ab456bfa23c306c7a09bf9
SHA25625d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a
SHA512c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4
-
Filesize
234KB
MD5bd2565dca2e215282d2ba84fcbb8f15b
SHA1619a3afa1a81b61eece7183eb52bfb1f8e6674d4
SHA256ee3b96c0c01657bee301cac73d08e33e7d8bd83f60d838f3880e273f10488b14
SHA512a84af2d4bd75f4812beda97a33150bea9e501cc89807ce5597efc678bbb8635b09466f186ad7f1adecbf8c7ca3ad5928d829aa83f667af97728ac75f30716b5a
-
Filesize
234KB
MD5bd2565dca2e215282d2ba84fcbb8f15b
SHA1619a3afa1a81b61eece7183eb52bfb1f8e6674d4
SHA256ee3b96c0c01657bee301cac73d08e33e7d8bd83f60d838f3880e273f10488b14
SHA512a84af2d4bd75f4812beda97a33150bea9e501cc89807ce5597efc678bbb8635b09466f186ad7f1adecbf8c7ca3ad5928d829aa83f667af97728ac75f30716b5a
-
Filesize
234KB
MD5bd2565dca2e215282d2ba84fcbb8f15b
SHA1619a3afa1a81b61eece7183eb52bfb1f8e6674d4
SHA256ee3b96c0c01657bee301cac73d08e33e7d8bd83f60d838f3880e273f10488b14
SHA512a84af2d4bd75f4812beda97a33150bea9e501cc89807ce5597efc678bbb8635b09466f186ad7f1adecbf8c7ca3ad5928d829aa83f667af97728ac75f30716b5a
-
Filesize
234KB
MD5bd2565dca2e215282d2ba84fcbb8f15b
SHA1619a3afa1a81b61eece7183eb52bfb1f8e6674d4
SHA256ee3b96c0c01657bee301cac73d08e33e7d8bd83f60d838f3880e273f10488b14
SHA512a84af2d4bd75f4812beda97a33150bea9e501cc89807ce5597efc678bbb8635b09466f186ad7f1adecbf8c7ca3ad5928d829aa83f667af97728ac75f30716b5a