Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
31/10/2023, 08:40
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.e824ffa0ad7389cc65bf20e022aa2c62.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.e824ffa0ad7389cc65bf20e022aa2c62.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.e824ffa0ad7389cc65bf20e022aa2c62.exe
-
Size
1.2MB
-
MD5
e824ffa0ad7389cc65bf20e022aa2c62
-
SHA1
60b10cb698f2763c36b5cbaae274cf10338beab0
-
SHA256
19b1243bfe0f27dfe7dc92869a17971c8be2d0e3bd861badf825bfb9a00f1c9c
-
SHA512
5919c938de222972bee1903002f12833199a1824dc2f48200902f37dc8b60a7d084331033373f9cb5bb826e4c0c179e3a78954268b7821baf8161b67144451aa
-
SSDEEP
24576:1vHPh2kkkkK4kXkkkkkkkkhLX3a20R0v50+YNpsKv2EvZHR:1vXbazR0vKLXZR
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhdcji32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enfenplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Enfenplo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efaibbij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Efaibbij.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad NEAS.e824ffa0ad7389cc65bf20e022aa2c62.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" NEAS.e824ffa0ad7389cc65bf20e022aa2c62.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhdcji32.exe -
Executes dropped EXE 4 IoCs
pid Process 1144 Dhdcji32.exe 3044 Enfenplo.exe 2888 Efaibbij.exe 2488 Fkckeh32.exe -
Loads dropped DLL 12 IoCs
pid Process 2224 NEAS.e824ffa0ad7389cc65bf20e022aa2c62.exe 2224 NEAS.e824ffa0ad7389cc65bf20e022aa2c62.exe 1144 Dhdcji32.exe 1144 Dhdcji32.exe 3044 Enfenplo.exe 3044 Enfenplo.exe 2888 Efaibbij.exe 2888 Efaibbij.exe 2508 WerFault.exe 2508 WerFault.exe 2508 WerFault.exe 2508 WerFault.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\Fkckeh32.exe Efaibbij.exe File created C:\Windows\SysWOW64\Dhdcji32.exe NEAS.e824ffa0ad7389cc65bf20e022aa2c62.exe File opened for modification C:\Windows\SysWOW64\Dhdcji32.exe NEAS.e824ffa0ad7389cc65bf20e022aa2c62.exe File created C:\Windows\SysWOW64\Kncphpjl.dll NEAS.e824ffa0ad7389cc65bf20e022aa2c62.exe File opened for modification C:\Windows\SysWOW64\Enfenplo.exe Dhdcji32.exe File created C:\Windows\SysWOW64\Efaibbij.exe Enfenplo.exe File opened for modification C:\Windows\SysWOW64\Efaibbij.exe Enfenplo.exe File created C:\Windows\SysWOW64\Lbadbn32.dll Enfenplo.exe File created C:\Windows\SysWOW64\Clkmne32.dll Efaibbij.exe File created C:\Windows\SysWOW64\Enfenplo.exe Dhdcji32.exe File created C:\Windows\SysWOW64\Lchkpi32.dll Dhdcji32.exe File opened for modification C:\Windows\SysWOW64\Fkckeh32.exe Efaibbij.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2508 2488 WerFault.exe 31 -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Enfenplo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Efaibbij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kncphpjl.dll" NEAS.e824ffa0ad7389cc65bf20e022aa2c62.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhdcji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" NEAS.e824ffa0ad7389cc65bf20e022aa2c62.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbadbn32.dll" Enfenplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clkmne32.dll" Efaibbij.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 NEAS.e824ffa0ad7389cc65bf20e022aa2c62.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} NEAS.e824ffa0ad7389cc65bf20e022aa2c62.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhdcji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Efaibbij.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node NEAS.e824ffa0ad7389cc65bf20e022aa2c62.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lchkpi32.dll" Dhdcji32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID NEAS.e824ffa0ad7389cc65bf20e022aa2c62.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Enfenplo.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2224 wrote to memory of 1144 2224 NEAS.e824ffa0ad7389cc65bf20e022aa2c62.exe 28 PID 2224 wrote to memory of 1144 2224 NEAS.e824ffa0ad7389cc65bf20e022aa2c62.exe 28 PID 2224 wrote to memory of 1144 2224 NEAS.e824ffa0ad7389cc65bf20e022aa2c62.exe 28 PID 2224 wrote to memory of 1144 2224 NEAS.e824ffa0ad7389cc65bf20e022aa2c62.exe 28 PID 1144 wrote to memory of 3044 1144 Dhdcji32.exe 29 PID 1144 wrote to memory of 3044 1144 Dhdcji32.exe 29 PID 1144 wrote to memory of 3044 1144 Dhdcji32.exe 29 PID 1144 wrote to memory of 3044 1144 Dhdcji32.exe 29 PID 3044 wrote to memory of 2888 3044 Enfenplo.exe 30 PID 3044 wrote to memory of 2888 3044 Enfenplo.exe 30 PID 3044 wrote to memory of 2888 3044 Enfenplo.exe 30 PID 3044 wrote to memory of 2888 3044 Enfenplo.exe 30 PID 2888 wrote to memory of 2488 2888 Efaibbij.exe 31 PID 2888 wrote to memory of 2488 2888 Efaibbij.exe 31 PID 2888 wrote to memory of 2488 2888 Efaibbij.exe 31 PID 2888 wrote to memory of 2488 2888 Efaibbij.exe 31 PID 2488 wrote to memory of 2508 2488 Fkckeh32.exe 32 PID 2488 wrote to memory of 2508 2488 Fkckeh32.exe 32 PID 2488 wrote to memory of 2508 2488 Fkckeh32.exe 32 PID 2488 wrote to memory of 2508 2488 Fkckeh32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.e824ffa0ad7389cc65bf20e022aa2c62.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e824ffa0ad7389cc65bf20e022aa2c62.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\Dhdcji32.exeC:\Windows\system32\Dhdcji32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\Enfenplo.exeC:\Windows\system32\Enfenplo.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\Efaibbij.exeC:\Windows\system32\Efaibbij.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\Fkckeh32.exeC:\Windows\system32\Fkckeh32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2488 -s 1406⤵
- Loads dropped DLL
- Program crash
PID:2508
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD583982aa552bd39018d4f08b40220137c
SHA1211face9bcae083f8715f11711468efbe4dd5510
SHA256138db562c1b43476ac527a5a131eef41d9c2d669d22f5665869a58aa96a67975
SHA512d30af1c27162264fd37400d102cd0e447ebe969d1904c3d739842b75290bf8cbb45b41f2055219af0c26a1cf7421d01795494054055e06c8b34bd278fddef5b6
-
Filesize
1.2MB
MD583982aa552bd39018d4f08b40220137c
SHA1211face9bcae083f8715f11711468efbe4dd5510
SHA256138db562c1b43476ac527a5a131eef41d9c2d669d22f5665869a58aa96a67975
SHA512d30af1c27162264fd37400d102cd0e447ebe969d1904c3d739842b75290bf8cbb45b41f2055219af0c26a1cf7421d01795494054055e06c8b34bd278fddef5b6
-
Filesize
1.2MB
MD583982aa552bd39018d4f08b40220137c
SHA1211face9bcae083f8715f11711468efbe4dd5510
SHA256138db562c1b43476ac527a5a131eef41d9c2d669d22f5665869a58aa96a67975
SHA512d30af1c27162264fd37400d102cd0e447ebe969d1904c3d739842b75290bf8cbb45b41f2055219af0c26a1cf7421d01795494054055e06c8b34bd278fddef5b6
-
Filesize
1.2MB
MD58b9834f9284e9f43019453eefe46bf5d
SHA17cb46258bb0a958f7387c9792d256c57a97d0c86
SHA256177de46fdaf942ef76369ec153fdfae8f66f2adc3ffcb49cf7392aea54baed0f
SHA512cb82e9b8ed2e8fc71af31252ed3c8c3f8fe39d6ef079b40fad5fdffb70e27607da62bbcdc95b4e3ad09995a49dd6feb70f8d64a8b59018894a310d6a155465ab
-
Filesize
1.2MB
MD58b9834f9284e9f43019453eefe46bf5d
SHA17cb46258bb0a958f7387c9792d256c57a97d0c86
SHA256177de46fdaf942ef76369ec153fdfae8f66f2adc3ffcb49cf7392aea54baed0f
SHA512cb82e9b8ed2e8fc71af31252ed3c8c3f8fe39d6ef079b40fad5fdffb70e27607da62bbcdc95b4e3ad09995a49dd6feb70f8d64a8b59018894a310d6a155465ab
-
Filesize
1.2MB
MD58b9834f9284e9f43019453eefe46bf5d
SHA17cb46258bb0a958f7387c9792d256c57a97d0c86
SHA256177de46fdaf942ef76369ec153fdfae8f66f2adc3ffcb49cf7392aea54baed0f
SHA512cb82e9b8ed2e8fc71af31252ed3c8c3f8fe39d6ef079b40fad5fdffb70e27607da62bbcdc95b4e3ad09995a49dd6feb70f8d64a8b59018894a310d6a155465ab
-
Filesize
1.2MB
MD5659ff32fd8087736368be984c681a771
SHA1239d5fd90cad8376431ead5bff5ca12c888b738f
SHA256fd8438d026e18a6b8637ef0312366d1bf46b309737895dd0936747de919a0592
SHA512a5fa30e75a72199e5ce585f7afcfe5e4ed549c016466ecc555d6767c1ed9cad5f16265789372bbb8b9e674f59a66c53e03bfbb6e44b3853bb3ebef90bd415fac
-
Filesize
1.2MB
MD5659ff32fd8087736368be984c681a771
SHA1239d5fd90cad8376431ead5bff5ca12c888b738f
SHA256fd8438d026e18a6b8637ef0312366d1bf46b309737895dd0936747de919a0592
SHA512a5fa30e75a72199e5ce585f7afcfe5e4ed549c016466ecc555d6767c1ed9cad5f16265789372bbb8b9e674f59a66c53e03bfbb6e44b3853bb3ebef90bd415fac
-
Filesize
1.2MB
MD5659ff32fd8087736368be984c681a771
SHA1239d5fd90cad8376431ead5bff5ca12c888b738f
SHA256fd8438d026e18a6b8637ef0312366d1bf46b309737895dd0936747de919a0592
SHA512a5fa30e75a72199e5ce585f7afcfe5e4ed549c016466ecc555d6767c1ed9cad5f16265789372bbb8b9e674f59a66c53e03bfbb6e44b3853bb3ebef90bd415fac
-
Filesize
1.2MB
MD56dc089168b489b4b12cdaa2bbac5d8e3
SHA10bd3a8f1ad5ccc705671d03d573e0e8f166758aa
SHA256f4dd05f1b8195fbaa5fd3be6b00d082f5b3cf97fe1d604a4a0db2a10c4f97afc
SHA512eb2b6970692e29116e4c347d11b5e9683be9ac9315f3f5b62c98db22f26657b77e253b0dd7638a60bd73c115df40159a10b76885ede081d4c344eccbe8fe9429
-
Filesize
1.2MB
MD56dc089168b489b4b12cdaa2bbac5d8e3
SHA10bd3a8f1ad5ccc705671d03d573e0e8f166758aa
SHA256f4dd05f1b8195fbaa5fd3be6b00d082f5b3cf97fe1d604a4a0db2a10c4f97afc
SHA512eb2b6970692e29116e4c347d11b5e9683be9ac9315f3f5b62c98db22f26657b77e253b0dd7638a60bd73c115df40159a10b76885ede081d4c344eccbe8fe9429
-
Filesize
1.2MB
MD583982aa552bd39018d4f08b40220137c
SHA1211face9bcae083f8715f11711468efbe4dd5510
SHA256138db562c1b43476ac527a5a131eef41d9c2d669d22f5665869a58aa96a67975
SHA512d30af1c27162264fd37400d102cd0e447ebe969d1904c3d739842b75290bf8cbb45b41f2055219af0c26a1cf7421d01795494054055e06c8b34bd278fddef5b6
-
Filesize
1.2MB
MD583982aa552bd39018d4f08b40220137c
SHA1211face9bcae083f8715f11711468efbe4dd5510
SHA256138db562c1b43476ac527a5a131eef41d9c2d669d22f5665869a58aa96a67975
SHA512d30af1c27162264fd37400d102cd0e447ebe969d1904c3d739842b75290bf8cbb45b41f2055219af0c26a1cf7421d01795494054055e06c8b34bd278fddef5b6
-
Filesize
1.2MB
MD58b9834f9284e9f43019453eefe46bf5d
SHA17cb46258bb0a958f7387c9792d256c57a97d0c86
SHA256177de46fdaf942ef76369ec153fdfae8f66f2adc3ffcb49cf7392aea54baed0f
SHA512cb82e9b8ed2e8fc71af31252ed3c8c3f8fe39d6ef079b40fad5fdffb70e27607da62bbcdc95b4e3ad09995a49dd6feb70f8d64a8b59018894a310d6a155465ab
-
Filesize
1.2MB
MD58b9834f9284e9f43019453eefe46bf5d
SHA17cb46258bb0a958f7387c9792d256c57a97d0c86
SHA256177de46fdaf942ef76369ec153fdfae8f66f2adc3ffcb49cf7392aea54baed0f
SHA512cb82e9b8ed2e8fc71af31252ed3c8c3f8fe39d6ef079b40fad5fdffb70e27607da62bbcdc95b4e3ad09995a49dd6feb70f8d64a8b59018894a310d6a155465ab
-
Filesize
1.2MB
MD5659ff32fd8087736368be984c681a771
SHA1239d5fd90cad8376431ead5bff5ca12c888b738f
SHA256fd8438d026e18a6b8637ef0312366d1bf46b309737895dd0936747de919a0592
SHA512a5fa30e75a72199e5ce585f7afcfe5e4ed549c016466ecc555d6767c1ed9cad5f16265789372bbb8b9e674f59a66c53e03bfbb6e44b3853bb3ebef90bd415fac
-
Filesize
1.2MB
MD5659ff32fd8087736368be984c681a771
SHA1239d5fd90cad8376431ead5bff5ca12c888b738f
SHA256fd8438d026e18a6b8637ef0312366d1bf46b309737895dd0936747de919a0592
SHA512a5fa30e75a72199e5ce585f7afcfe5e4ed549c016466ecc555d6767c1ed9cad5f16265789372bbb8b9e674f59a66c53e03bfbb6e44b3853bb3ebef90bd415fac
-
Filesize
1.2MB
MD56dc089168b489b4b12cdaa2bbac5d8e3
SHA10bd3a8f1ad5ccc705671d03d573e0e8f166758aa
SHA256f4dd05f1b8195fbaa5fd3be6b00d082f5b3cf97fe1d604a4a0db2a10c4f97afc
SHA512eb2b6970692e29116e4c347d11b5e9683be9ac9315f3f5b62c98db22f26657b77e253b0dd7638a60bd73c115df40159a10b76885ede081d4c344eccbe8fe9429
-
Filesize
1.2MB
MD56dc089168b489b4b12cdaa2bbac5d8e3
SHA10bd3a8f1ad5ccc705671d03d573e0e8f166758aa
SHA256f4dd05f1b8195fbaa5fd3be6b00d082f5b3cf97fe1d604a4a0db2a10c4f97afc
SHA512eb2b6970692e29116e4c347d11b5e9683be9ac9315f3f5b62c98db22f26657b77e253b0dd7638a60bd73c115df40159a10b76885ede081d4c344eccbe8fe9429
-
Filesize
1.2MB
MD56dc089168b489b4b12cdaa2bbac5d8e3
SHA10bd3a8f1ad5ccc705671d03d573e0e8f166758aa
SHA256f4dd05f1b8195fbaa5fd3be6b00d082f5b3cf97fe1d604a4a0db2a10c4f97afc
SHA512eb2b6970692e29116e4c347d11b5e9683be9ac9315f3f5b62c98db22f26657b77e253b0dd7638a60bd73c115df40159a10b76885ede081d4c344eccbe8fe9429
-
Filesize
1.2MB
MD56dc089168b489b4b12cdaa2bbac5d8e3
SHA10bd3a8f1ad5ccc705671d03d573e0e8f166758aa
SHA256f4dd05f1b8195fbaa5fd3be6b00d082f5b3cf97fe1d604a4a0db2a10c4f97afc
SHA512eb2b6970692e29116e4c347d11b5e9683be9ac9315f3f5b62c98db22f26657b77e253b0dd7638a60bd73c115df40159a10b76885ede081d4c344eccbe8fe9429
-
Filesize
1.2MB
MD56dc089168b489b4b12cdaa2bbac5d8e3
SHA10bd3a8f1ad5ccc705671d03d573e0e8f166758aa
SHA256f4dd05f1b8195fbaa5fd3be6b00d082f5b3cf97fe1d604a4a0db2a10c4f97afc
SHA512eb2b6970692e29116e4c347d11b5e9683be9ac9315f3f5b62c98db22f26657b77e253b0dd7638a60bd73c115df40159a10b76885ede081d4c344eccbe8fe9429
-
Filesize
1.2MB
MD56dc089168b489b4b12cdaa2bbac5d8e3
SHA10bd3a8f1ad5ccc705671d03d573e0e8f166758aa
SHA256f4dd05f1b8195fbaa5fd3be6b00d082f5b3cf97fe1d604a4a0db2a10c4f97afc
SHA512eb2b6970692e29116e4c347d11b5e9683be9ac9315f3f5b62c98db22f26657b77e253b0dd7638a60bd73c115df40159a10b76885ede081d4c344eccbe8fe9429