Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    01/11/2023, 14:10

General

  • Target

    NEAS.674f85e97bdb886c6f76e7ad5cf05d90.exe

  • Size

    1.6MB

  • MD5

    674f85e97bdb886c6f76e7ad5cf05d90

  • SHA1

    7944941874daefd24ba31f118b0c48d437301303

  • SHA256

    57de148fea83f7d6a9e5f1a1ebf1cc2a63ea3902a1d89653db24f83fddaadb58

  • SHA512

    b7defcc725a7b4c659285dfd8e4663f85f78c7d8b0d9b27e51fa4b99c85f08455db988b2125a333d404b41dcd6e4485ef31b92266c6784c1e79fa8a9bea2d070

  • SSDEEP

    24576:eLILY8Xu/3y8UsG2BgYLicwnkJnCHdebUKyZURQ1TgjTH:ZYrC8UsGuTw4CHdeQKyZURQ1EjTH

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.674f85e97bdb886c6f76e7ad5cf05d90.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.674f85e97bdb886c6f76e7ad5cf05d90.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\NEAS.674f85e97bdb886c6f76e7ad5cf05d90.doc"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2560

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\675414635.tmp

      Filesize

      1.6MB

      MD5

      674f85e97bdb886c6f76e7ad5cf05d90

      SHA1

      7944941874daefd24ba31f118b0c48d437301303

      SHA256

      57de148fea83f7d6a9e5f1a1ebf1cc2a63ea3902a1d89653db24f83fddaadb58

      SHA512

      b7defcc725a7b4c659285dfd8e4663f85f78c7d8b0d9b27e51fa4b99c85f08455db988b2125a333d404b41dcd6e4485ef31b92266c6784c1e79fa8a9bea2d070

    • C:\Users\Admin\AppData\Local\Temp\NEAS.674f85e97bdb886c6f76e7ad5cf05d90.doc

      Filesize

      41KB

      MD5

      075b745956d473c5a06d4a588ed560f7

      SHA1

      de12b14e07b1612db081078c41a2105d7ae12669

      SHA256

      de83738c15275fdb153937b60ba5f86c9886537a50ab95f8eb5642f7c2753e1e

      SHA512

      29304771a2878600a26d85f5c254a7eb9827fb35dc59efeea2dab097e4eb3c82e7dbb4e33473c9dac377973fb69039a39490986cf2fa3561166b7e0ddde25265

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      e7679279d54d7584b7833157bff63602

      SHA1

      1d06881924c3cc6bc12d668a369e3b18d551e37f

      SHA256

      6887f790e5e0f46b45ff886ebc606558724ac8eda93fbd7fdeef4dd6eda68b3d

      SHA512

      28cd56afe63e0b232fcdf8a5d2aa1308693159995b25165e11435d7b8bb047a2525b9889973e7fabe6617b736bda3ced23cc4901dc0d5ec1e4e621acc3d86135

    • memory/2772-10-0x000000002F511000-0x000000002F512000-memory.dmp

      Filesize

      4KB

    • memory/2772-11-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2772-12-0x00000000716CD000-0x00000000716D8000-memory.dmp

      Filesize

      44KB

    • memory/2772-21-0x00000000716CD000-0x00000000716D8000-memory.dmp

      Filesize

      44KB

    • memory/2772-37-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2772-38-0x00000000716CD000-0x00000000716D8000-memory.dmp

      Filesize

      44KB