Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 13:57
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.367f351d7369a84288441e31958ac030.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.367f351d7369a84288441e31958ac030.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.367f351d7369a84288441e31958ac030.exe
-
Size
212KB
-
MD5
367f351d7369a84288441e31958ac030
-
SHA1
d7372308577f0b3551312351c3c3c413a17d09fe
-
SHA256
ec50f9e4c09ca607b56e003bfa1669546041f7da38a929cfe3ebb6f48444c3dd
-
SHA512
a0cd84877e187c108efe6dcf2d4d3215a650301a1062d891c45eb36a35d367215106902df1d40d41bdda0d970963b586286fff4f91b0c3218cb236a278f29e06
-
SSDEEP
6144:7xNqLW6opBZMU/y/JEGjg+op2BSNCCr7/jU:FA6NBT/yEGjWwa7vU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2360 svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\fdfe1225 = "C:\\Windows\\apppatch\\svchost.exe" NEAS.367f351d7369a84288441e31958ac030.exe -
Drops file in Program Files directory 22 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyrysor.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\volykit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\puzylyp.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyhub.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyvyxor.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\purylev.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pumyjig.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe NEAS.367f351d7369a84288441e31958ac030.exe File opened for modification C:\Windows\apppatch\svchost.exe NEAS.367f351d7369a84288441e31958ac030.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2152 NEAS.367f351d7369a84288441e31958ac030.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2152 NEAS.367f351d7369a84288441e31958ac030.exe Token: SeSecurityPrivilege 2152 NEAS.367f351d7369a84288441e31958ac030.exe Token: SeSecurityPrivilege 2360 svchost.exe Token: SeSecurityPrivilege 2360 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2360 2152 NEAS.367f351d7369a84288441e31958ac030.exe 85 PID 2152 wrote to memory of 2360 2152 NEAS.367f351d7369a84288441e31958ac030.exe 85 PID 2152 wrote to memory of 2360 2152 NEAS.367f351d7369a84288441e31958ac030.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.367f351d7369a84288441e31958ac030.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.367f351d7369a84288441e31958ac030.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
212KB
MD5cea6455a0c799a25855485a8c5316109
SHA152a10b061c9bf1bceeaca36bb7f2827f4c258058
SHA256d50167b714fa068de64fa456d0ad33875db85186b3710fbbb568e9bff1edf9c7
SHA5125c6f1f90fd081cacca94691f08504ea0cfdcc3ebde3346032004e6dbef5dea36d4c03c724b3fb4fb3cbb68ee1af054cb96a6b09cb9726c77c8d67fd283cd853e
-
Filesize
212KB
MD5cea6455a0c799a25855485a8c5316109
SHA152a10b061c9bf1bceeaca36bb7f2827f4c258058
SHA256d50167b714fa068de64fa456d0ad33875db85186b3710fbbb568e9bff1edf9c7
SHA5125c6f1f90fd081cacca94691f08504ea0cfdcc3ebde3346032004e6dbef5dea36d4c03c724b3fb4fb3cbb68ee1af054cb96a6b09cb9726c77c8d67fd283cd853e
-
Filesize
212KB
MD5cea6455a0c799a25855485a8c5316109
SHA152a10b061c9bf1bceeaca36bb7f2827f4c258058
SHA256d50167b714fa068de64fa456d0ad33875db85186b3710fbbb568e9bff1edf9c7
SHA5125c6f1f90fd081cacca94691f08504ea0cfdcc3ebde3346032004e6dbef5dea36d4c03c724b3fb4fb3cbb68ee1af054cb96a6b09cb9726c77c8d67fd283cd853e