Analysis
-
max time kernel
168s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2023 14:10
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.5fb4e794e2786fbd9d9989ed4c47cfb0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.5fb4e794e2786fbd9d9989ed4c47cfb0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.5fb4e794e2786fbd9d9989ed4c47cfb0.exe
-
Size
211KB
-
MD5
5fb4e794e2786fbd9d9989ed4c47cfb0
-
SHA1
b03f9b31ff9e3941dc883937ec1bc866e0b7151b
-
SHA256
de3f3f1f6d692289bae0f1d3ed5d9cf12948dc9fe29291ebf9a7026825772445
-
SHA512
3e2f2bfc8273f9280fbf1c8abe7648f807ec7b79a3e9ddaf32f2788840c40940586acc7df2cf4ad66773d681a54a61266e8ceafe6a8256b7d570a656bb5fe69a
-
SSDEEP
3072:WD6Xtx68yygRBE52mxkEOHLRMpZ4deth8PEAjAfIbAYGPhz6sPJBInxZqOF:Wh8cBzHLRMpZ4d1ZF
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" swchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" userinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" swchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" userinit.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe -
Executes dropped EXE 4 IoCs
pid Process 876 userinit.exe 3552 spoolsw.exe 4644 swchost.exe 1856 spoolsw.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" swchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\system\udsys.exe userinit.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\userinit.exe NEAS.5fb4e794e2786fbd9d9989ed4c47cfb0.exe File opened for modification \??\c:\windows\spoolsw.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe spoolsw.exe File opened for modification \??\c:\windows\userinit.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe swchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1656 NEAS.5fb4e794e2786fbd9d9989ed4c47cfb0.exe 1656 NEAS.5fb4e794e2786fbd9d9989ed4c47cfb0.exe 876 userinit.exe 876 userinit.exe 876 userinit.exe 876 userinit.exe 876 userinit.exe 876 userinit.exe 876 userinit.exe 876 userinit.exe 4644 swchost.exe 4644 swchost.exe 4644 swchost.exe 4644 swchost.exe 876 userinit.exe 876 userinit.exe 4644 swchost.exe 4644 swchost.exe 876 userinit.exe 876 userinit.exe 4644 swchost.exe 4644 swchost.exe 876 userinit.exe 876 userinit.exe 4644 swchost.exe 4644 swchost.exe 876 userinit.exe 876 userinit.exe 876 userinit.exe 876 userinit.exe 4644 swchost.exe 4644 swchost.exe 4644 swchost.exe 876 userinit.exe 4644 swchost.exe 876 userinit.exe 4644 swchost.exe 876 userinit.exe 876 userinit.exe 4644 swchost.exe 876 userinit.exe 4644 swchost.exe 4644 swchost.exe 876 userinit.exe 876 userinit.exe 4644 swchost.exe 876 userinit.exe 4644 swchost.exe 876 userinit.exe 4644 swchost.exe 876 userinit.exe 4644 swchost.exe 4644 swchost.exe 876 userinit.exe 876 userinit.exe 4644 swchost.exe 876 userinit.exe 4644 swchost.exe 876 userinit.exe 4644 swchost.exe 876 userinit.exe 4644 swchost.exe 876 userinit.exe 4644 swchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 876 userinit.exe 4644 swchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1656 NEAS.5fb4e794e2786fbd9d9989ed4c47cfb0.exe 1656 NEAS.5fb4e794e2786fbd9d9989ed4c47cfb0.exe 876 userinit.exe 876 userinit.exe 3552 spoolsw.exe 3552 spoolsw.exe 4644 swchost.exe 4644 swchost.exe 1856 spoolsw.exe 1856 spoolsw.exe 876 userinit.exe 876 userinit.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1656 wrote to memory of 876 1656 NEAS.5fb4e794e2786fbd9d9989ed4c47cfb0.exe 90 PID 1656 wrote to memory of 876 1656 NEAS.5fb4e794e2786fbd9d9989ed4c47cfb0.exe 90 PID 1656 wrote to memory of 876 1656 NEAS.5fb4e794e2786fbd9d9989ed4c47cfb0.exe 90 PID 876 wrote to memory of 3552 876 userinit.exe 91 PID 876 wrote to memory of 3552 876 userinit.exe 91 PID 876 wrote to memory of 3552 876 userinit.exe 91 PID 3552 wrote to memory of 4644 3552 spoolsw.exe 92 PID 3552 wrote to memory of 4644 3552 spoolsw.exe 92 PID 3552 wrote to memory of 4644 3552 spoolsw.exe 92 PID 4644 wrote to memory of 1856 4644 swchost.exe 93 PID 4644 wrote to memory of 1856 4644 swchost.exe 93 PID 4644 wrote to memory of 1856 4644 swchost.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5fb4e794e2786fbd9d9989ed4c47cfb0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5fb4e794e2786fbd9d9989ed4c47cfb0.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
\??\c:\windows\userinit.exec:\windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:876 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3552 -
\??\c:\windows\swchost.exec:\windows\swchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4644 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1856
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD57f706ceac7e0144a6d064c67fb754a31
SHA1c71b26474835006310d3731800096036c032f8c2
SHA2560a543b025480ce4ab7a78c73beee9817468dc2ff0c4f091f816725dd16bba94c
SHA51236ffbd3b889e088eace8a83a5ee43833c53122789927d217abf88ebdc76d79a8ed8c89a725555a8ea1a1fb99d34d62aae26242d463622858808d122e01d130b7
-
Filesize
211KB
MD5829a26801d0f5a95c278eeab0bbc7505
SHA1b4fbf69c8c3a8ecedea6785ce4cf526ec72a62c4
SHA256f171203821fee1fd2eb8c0152a7f1ea6e95db26e2ee281131993c6684bc3f6b7
SHA512daf4311a317c9a32620a04f4e346af4502418322d2468f8cc03bd3e887df3d358d762d150447a26d53a4160dcbd499fff9d69474555e50d7dab53644701ae18a
-
Filesize
211KB
MD5829a26801d0f5a95c278eeab0bbc7505
SHA1b4fbf69c8c3a8ecedea6785ce4cf526ec72a62c4
SHA256f171203821fee1fd2eb8c0152a7f1ea6e95db26e2ee281131993c6684bc3f6b7
SHA512daf4311a317c9a32620a04f4e346af4502418322d2468f8cc03bd3e887df3d358d762d150447a26d53a4160dcbd499fff9d69474555e50d7dab53644701ae18a
-
Filesize
211KB
MD5829a26801d0f5a95c278eeab0bbc7505
SHA1b4fbf69c8c3a8ecedea6785ce4cf526ec72a62c4
SHA256f171203821fee1fd2eb8c0152a7f1ea6e95db26e2ee281131993c6684bc3f6b7
SHA512daf4311a317c9a32620a04f4e346af4502418322d2468f8cc03bd3e887df3d358d762d150447a26d53a4160dcbd499fff9d69474555e50d7dab53644701ae18a
-
Filesize
211KB
MD5942b9db8589eec899738c77425e10e9c
SHA1aabcf0e0aa18d975c41f582cbe7b58cfca1e31dc
SHA256c201a19b686b3ceefe874ba3d301610e1d50c6d3b934a183e36417120df3a625
SHA5123e0e53dfe2178081964b872000df0dd6ec5452ba7cec91a5a13707342125e827291be3e46b81580161a4b387744d3578be3a00c68784abe15d47599d70469c69
-
Filesize
211KB
MD59cb246821adc886f469f3325d1a77581
SHA14fbfb69a3933efc2f50de60dc5ba5565ce674a23
SHA256cddaedf8e7683fedb907bf78b38c230bc6b649c5146f94b89ba7e350d11a611a
SHA512ef075b7f289cc24fac1f15b386efe6becbf2e1a087d26dc8ba10c1858ccf1d683e5d23f634491ee482108426fe35f17b6a4fae79d15e0d344d90dc3e73bedef5
-
Filesize
211KB
MD5829a26801d0f5a95c278eeab0bbc7505
SHA1b4fbf69c8c3a8ecedea6785ce4cf526ec72a62c4
SHA256f171203821fee1fd2eb8c0152a7f1ea6e95db26e2ee281131993c6684bc3f6b7
SHA512daf4311a317c9a32620a04f4e346af4502418322d2468f8cc03bd3e887df3d358d762d150447a26d53a4160dcbd499fff9d69474555e50d7dab53644701ae18a
-
Filesize
211KB
MD5942b9db8589eec899738c77425e10e9c
SHA1aabcf0e0aa18d975c41f582cbe7b58cfca1e31dc
SHA256c201a19b686b3ceefe874ba3d301610e1d50c6d3b934a183e36417120df3a625
SHA5123e0e53dfe2178081964b872000df0dd6ec5452ba7cec91a5a13707342125e827291be3e46b81580161a4b387744d3578be3a00c68784abe15d47599d70469c69
-
Filesize
211KB
MD59cb246821adc886f469f3325d1a77581
SHA14fbfb69a3933efc2f50de60dc5ba5565ce674a23
SHA256cddaedf8e7683fedb907bf78b38c230bc6b649c5146f94b89ba7e350d11a611a
SHA512ef075b7f289cc24fac1f15b386efe6becbf2e1a087d26dc8ba10c1858ccf1d683e5d23f634491ee482108426fe35f17b6a4fae79d15e0d344d90dc3e73bedef5