Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
31/10/2023, 08:50
Behavioral task
behavioral1
Sample
NEAS.0f929978f66fb505ee77333a748ca550.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.0f929978f66fb505ee77333a748ca550.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.0f929978f66fb505ee77333a748ca550.exe
-
Size
181KB
-
MD5
0f929978f66fb505ee77333a748ca550
-
SHA1
83aef5af782148f617db278351337c9d73420336
-
SHA256
9acfb28d547a7ea9056340cc9f2f9eeaccbece3dfbfbc2831a2c2126af353bd9
-
SHA512
bd49d888f46d191ce063e2f97eb836094ccbe549c43ffa34c11a50752e9a9ca94dd882f5d87d5522ba51f0a949caa31f1ae182de32ffddfff41117bafecb32b8
-
SSDEEP
3072:M1abGWGT2TK1dbzlF9OVtSZjCw8geIr/QAuCgNVfpxICuQsKUIZn:9bpGtfoVtScw2RCgrzItQB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1628 XKTBS.EXE -
Loads dropped DLL 2 IoCs
pid Process 2696 NEAS.0f929978f66fb505ee77333a748ca550.exe 2696 NEAS.0f929978f66fb505ee77333a748ca550.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command XKTBS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\PerfLogs\\HOY.EXE \"%1\" %*" XKTBS.EXE -
resource yara_rule behavioral1/memory/2696-0-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/files/0x0007000000016d39-12.dat upx behavioral1/files/0x000e00000001201d-22.dat upx behavioral1/files/0x000e00000001201d-20.dat upx behavioral1/memory/1628-28-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/files/0x000e00000001201d-27.dat upx behavioral1/memory/2696-30-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/1628-32-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/1628-33-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/files/0x000e00000001201d-34.dat upx behavioral1/memory/1628-38-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/1628-39-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/1628-40-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/1628-41-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/1628-42-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/1628-44-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/1628-45-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/1628-46-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/1628-47-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/1628-48-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/1628-49-0x0000000000400000-0x000000000046E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TAZFAI.EXE = "C:\\Users\\TAZFAI.EXE" NEAS.0f929978f66fb505ee77333a748ca550.exe -
Enumerates connected drives 3 TTPs 34 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: NEAS.0f929978f66fb505ee77333a748ca550.exe File opened (read-only) \??\T: NEAS.0f929978f66fb505ee77333a748ca550.exe File opened (read-only) \??\H: NEAS.0f929978f66fb505ee77333a748ca550.exe File opened (read-only) \??\R: XKTBS.EXE File opened (read-only) \??\G: XKTBS.EXE File opened (read-only) \??\L: XKTBS.EXE File opened (read-only) \??\M: XKTBS.EXE File opened (read-only) \??\N: NEAS.0f929978f66fb505ee77333a748ca550.exe File opened (read-only) \??\P: NEAS.0f929978f66fb505ee77333a748ca550.exe File opened (read-only) \??\R: NEAS.0f929978f66fb505ee77333a748ca550.exe File opened (read-only) \??\N: XKTBS.EXE File opened (read-only) \??\S: NEAS.0f929978f66fb505ee77333a748ca550.exe File opened (read-only) \??\U: NEAS.0f929978f66fb505ee77333a748ca550.exe File opened (read-only) \??\E: XKTBS.EXE File opened (read-only) \??\U: XKTBS.EXE File opened (read-only) \??\V: XKTBS.EXE File opened (read-only) \??\J: NEAS.0f929978f66fb505ee77333a748ca550.exe File opened (read-only) \??\I: XKTBS.EXE File opened (read-only) \??\T: XKTBS.EXE File opened (read-only) \??\O: NEAS.0f929978f66fb505ee77333a748ca550.exe File opened (read-only) \??\Q: NEAS.0f929978f66fb505ee77333a748ca550.exe File opened (read-only) \??\J: XKTBS.EXE File opened (read-only) \??\P: XKTBS.EXE File opened (read-only) \??\E: NEAS.0f929978f66fb505ee77333a748ca550.exe File opened (read-only) \??\K: NEAS.0f929978f66fb505ee77333a748ca550.exe File opened (read-only) \??\M: NEAS.0f929978f66fb505ee77333a748ca550.exe File opened (read-only) \??\O: XKTBS.EXE File opened (read-only) \??\S: XKTBS.EXE File opened (read-only) \??\I: NEAS.0f929978f66fb505ee77333a748ca550.exe File opened (read-only) \??\H: XKTBS.EXE File opened (read-only) \??\K: XKTBS.EXE File opened (read-only) \??\L: NEAS.0f929978f66fb505ee77333a748ca550.exe File opened (read-only) \??\V: NEAS.0f929978f66fb505ee77333a748ca550.exe File opened (read-only) \??\Q: XKTBS.EXE -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\XKTBS.EXE NEAS.0f929978f66fb505ee77333a748ca550.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\EWWLBDA.EXE NEAS.0f929978f66fb505ee77333a748ca550.exe -
Modifies registry class 17 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open\command\ = "C:\\PerfLogs\\IXYF.EXE \"%1\"" NEAS.0f929978f66fb505ee77333a748ca550.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open\command\ = "C:\\PerfLogs\\IXYF.EXE \"%1\" %*" NEAS.0f929978f66fb505ee77333a748ca550.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command XKTBS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command NEAS.0f929978f66fb505ee77333a748ca550.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell NEAS.0f929978f66fb505ee77333a748ca550.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell\open\command\ = "C:\\PerfLogs\\IXYF.EXE %1" NEAS.0f929978f66fb505ee77333a748ca550.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell NEAS.0f929978f66fb505ee77333a748ca550.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open\command NEAS.0f929978f66fb505ee77333a748ca550.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\PerfLogs\\HOY.EXE \"%1\" %*" XKTBS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open\command\ = "C:\\PerfLogs\\IXYF.EXE %1" NEAS.0f929978f66fb505ee77333a748ca550.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell\open\command NEAS.0f929978f66fb505ee77333a748ca550.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file NEAS.0f929978f66fb505ee77333a748ca550.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell\open NEAS.0f929978f66fb505ee77333a748ca550.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open NEAS.0f929978f66fb505ee77333a748ca550.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Users\\BLUVYE.EXE %1" NEAS.0f929978f66fb505ee77333a748ca550.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open\command NEAS.0f929978f66fb505ee77333a748ca550.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile NEAS.0f929978f66fb505ee77333a748ca550.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1628 XKTBS.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 1628 2696 NEAS.0f929978f66fb505ee77333a748ca550.exe 28 PID 2696 wrote to memory of 1628 2696 NEAS.0f929978f66fb505ee77333a748ca550.exe 28 PID 2696 wrote to memory of 1628 2696 NEAS.0f929978f66fb505ee77333a748ca550.exe 28 PID 2696 wrote to memory of 1628 2696 NEAS.0f929978f66fb505ee77333a748ca550.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.0f929978f66fb505ee77333a748ca550.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.0f929978f66fb505ee77333a748ca550.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\XKTBS.EXE"C:\Program Files (x86)\XKTBS.EXE"2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:1628
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181KB
MD582c4643138bc901afc5c460cc738865b
SHA13e5834f912124866422bb7fff6ce3a64dd038114
SHA256dc0d90bfd1097c95478a412750315e34b867a74c7d033b9e295f27b3093d2f2b
SHA51239b86c4aa2e0a02f6da0d9b4d78426c4d026fd20ca959b8b25a41e34e57361547433293bb1e450762406d71c8f336ec2932a408e314fe9b0717ae995ab078578
-
Filesize
182KB
MD53789324de5dbe05d27abf40191acfa12
SHA146515147ed80d79c046c04f55bef88dab374565b
SHA256ceb63e92f91bce0afe819583d85bd400b8dc1eaee672ff375ee798815a4011c1
SHA512b695c45806ca2d7b10ff3e31c5553c3938d786a99658f423b87b69e4291fcd1be16982e2e50304144f16f5071f8ee4b02305d36dce1fca9eb13f14a5e233a47b
-
Filesize
182KB
MD53789324de5dbe05d27abf40191acfa12
SHA146515147ed80d79c046c04f55bef88dab374565b
SHA256ceb63e92f91bce0afe819583d85bd400b8dc1eaee672ff375ee798815a4011c1
SHA512b695c45806ca2d7b10ff3e31c5553c3938d786a99658f423b87b69e4291fcd1be16982e2e50304144f16f5071f8ee4b02305d36dce1fca9eb13f14a5e233a47b
-
Filesize
231B
MD5c67186cb947e62e9e7bff7ccdac66cd1
SHA1adbc18d5c3d1bf0ce2f88509ab2659881809f35b
SHA2568062201ab597475916afc5dc4e6a3b88ac9f55717aa5be58885ef6ac7c781923
SHA51233fe30228d9797258a8c3342bd9e812f26577a6ddbea5b4cd28277e6afdaf43dac6506a330fe1ffe443a63a68b0ffbd82bba867bbb4777347ed5d95fe849be30
-
Filesize
182KB
MD53789324de5dbe05d27abf40191acfa12
SHA146515147ed80d79c046c04f55bef88dab374565b
SHA256ceb63e92f91bce0afe819583d85bd400b8dc1eaee672ff375ee798815a4011c1
SHA512b695c45806ca2d7b10ff3e31c5553c3938d786a99658f423b87b69e4291fcd1be16982e2e50304144f16f5071f8ee4b02305d36dce1fca9eb13f14a5e233a47b
-
Filesize
182KB
MD53789324de5dbe05d27abf40191acfa12
SHA146515147ed80d79c046c04f55bef88dab374565b
SHA256ceb63e92f91bce0afe819583d85bd400b8dc1eaee672ff375ee798815a4011c1
SHA512b695c45806ca2d7b10ff3e31c5553c3938d786a99658f423b87b69e4291fcd1be16982e2e50304144f16f5071f8ee4b02305d36dce1fca9eb13f14a5e233a47b