Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/11/2023, 13:57

General

  • Target

    NEAS.367f351d7369a84288441e31958ac030.exe

  • Size

    212KB

  • MD5

    367f351d7369a84288441e31958ac030

  • SHA1

    d7372308577f0b3551312351c3c3c413a17d09fe

  • SHA256

    ec50f9e4c09ca607b56e003bfa1669546041f7da38a929cfe3ebb6f48444c3dd

  • SHA512

    a0cd84877e187c108efe6dcf2d4d3215a650301a1062d891c45eb36a35d367215106902df1d40d41bdda0d970963b586286fff4f91b0c3218cb236a278f29e06

  • SSDEEP

    6144:7xNqLW6opBZMU/y/JEGjg+op2BSNCCr7/jU:FA6NBT/yEGjWwa7vU

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in Program Files directory 22 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.367f351d7369a84288441e31958ac030.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.367f351d7369a84288441e31958ac030.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2360

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Low\IE\OP0HTQ8A\login[1].htm

          Filesize

          168B

          MD5

          d57e3a550060f85d44a175139ea23021

          SHA1

          2c5cb3428a322c9709a34d04dd86fe7628f8f0a6

          SHA256

          43edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c

          SHA512

          0364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063

        • C:\Windows\apppatch\svchost.exe

          Filesize

          212KB

          MD5

          cea6455a0c799a25855485a8c5316109

          SHA1

          52a10b061c9bf1bceeaca36bb7f2827f4c258058

          SHA256

          d50167b714fa068de64fa456d0ad33875db85186b3710fbbb568e9bff1edf9c7

          SHA512

          5c6f1f90fd081cacca94691f08504ea0cfdcc3ebde3346032004e6dbef5dea36d4c03c724b3fb4fb3cbb68ee1af054cb96a6b09cb9726c77c8d67fd283cd853e

        • C:\Windows\apppatch\svchost.exe

          Filesize

          212KB

          MD5

          cea6455a0c799a25855485a8c5316109

          SHA1

          52a10b061c9bf1bceeaca36bb7f2827f4c258058

          SHA256

          d50167b714fa068de64fa456d0ad33875db85186b3710fbbb568e9bff1edf9c7

          SHA512

          5c6f1f90fd081cacca94691f08504ea0cfdcc3ebde3346032004e6dbef5dea36d4c03c724b3fb4fb3cbb68ee1af054cb96a6b09cb9726c77c8d67fd283cd853e

        • C:\Windows\apppatch\svchost.exe

          Filesize

          212KB

          MD5

          cea6455a0c799a25855485a8c5316109

          SHA1

          52a10b061c9bf1bceeaca36bb7f2827f4c258058

          SHA256

          d50167b714fa068de64fa456d0ad33875db85186b3710fbbb568e9bff1edf9c7

          SHA512

          5c6f1f90fd081cacca94691f08504ea0cfdcc3ebde3346032004e6dbef5dea36d4c03c724b3fb4fb3cbb68ee1af054cb96a6b09cb9726c77c8d67fd283cd853e

        • memory/2152-0-0x00000000021F0000-0x0000000002242000-memory.dmp

          Filesize

          328KB

        • memory/2152-1-0x0000000000400000-0x000000000049A000-memory.dmp

          Filesize

          616KB

        • memory/2152-13-0x00000000021F0000-0x0000000002242000-memory.dmp

          Filesize

          328KB

        • memory/2152-15-0x0000000000400000-0x000000000049A000-memory.dmp

          Filesize

          616KB

        • memory/2360-14-0x00000000022A0000-0x00000000022F2000-memory.dmp

          Filesize

          328KB

        • memory/2360-16-0x0000000002490000-0x000000000253A000-memory.dmp

          Filesize

          680KB

        • memory/2360-18-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-20-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-22-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-23-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-24-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-25-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-26-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-27-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-28-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-30-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-29-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-31-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-33-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-32-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-34-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-35-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-36-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-38-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-39-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-41-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-45-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-46-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-49-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-52-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-51-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-56-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-54-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-58-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-62-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-63-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-65-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-66-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-68-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-70-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-71-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-73-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-74-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-76-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-77-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-80-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-228-0x0000000000400000-0x000000000049A000-memory.dmp

          Filesize

          616KB

        • memory/2360-302-0x0000000002C40000-0x0000000002CF7000-memory.dmp

          Filesize

          732KB

        • memory/2360-2093-0x0000000077692000-0x0000000077693000-memory.dmp

          Filesize

          4KB

        • memory/2360-2108-0x0000000008C30000-0x0000000008C31000-memory.dmp

          Filesize

          4KB

        • memory/2360-2105-0x000000000AFD0000-0x000000000AFD1000-memory.dmp

          Filesize

          4KB

        • memory/2360-2111-0x0000000008C40000-0x0000000008C41000-memory.dmp

          Filesize

          4KB

        • memory/2360-2346-0x0000000077692000-0x0000000077693000-memory.dmp

          Filesize

          4KB