Analysis
-
max time kernel
35s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 14:11
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe
-
Size
267KB
-
MD5
719c0791f626c70d0c5cb4c43e83fa90
-
SHA1
75c1cda99dc949acb9d69d31884785f81a85da7c
-
SHA256
61cbb11ab0135c985a2ff2cbb30af971ed3df84fecd01f24c1930a7cfdd48780
-
SHA512
3651acee5ba4a34bb02c5033d0ec80b3d38540601e7ccfa3db2c649a4ed7078b5c6a095f9cbc1c42aba2a38c8cf5c35db156140fe85b6102f89972d34096520e
-
SSDEEP
3072:WcX93xwq19gL2SjGojCJa79TBfsY5vXWqvuHcYnLzqP2Qu:WcNhJgX9z9TB0YRX8n6u
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\fakerdtsc\ImagePath = 5c003f003f005c0043003a005c00550073006500720073005c00410064006d0069006e005c0041007000700044006100740061005c004c006f00630061006c005c00540065006d0070005c00660061006b006500720064007400730063002e007300790073000000 NEAS.719C0791F626C70D0C5CB4C43E83FA90.EXE -
Executes dropped EXE 4 IoCs
pid Process 4512 MSWDM.EXE 4836 MSWDM.EXE 2208 NEAS.719C0791F626C70D0C5CB4C43E83FA90.EXE 1860 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe File opened for modification C:\Windows\dev290F.tmp NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe File opened for modification C:\Windows\dev290F.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4836 MSWDM.EXE 4836 MSWDM.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2208 NEAS.719C0791F626C70D0C5CB4C43E83FA90.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2208 NEAS.719C0791F626C70D0C5CB4C43E83FA90.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1912 wrote to memory of 4512 1912 NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe 84 PID 1912 wrote to memory of 4512 1912 NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe 84 PID 1912 wrote to memory of 4512 1912 NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe 84 PID 1912 wrote to memory of 4836 1912 NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe 85 PID 1912 wrote to memory of 4836 1912 NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe 85 PID 1912 wrote to memory of 4836 1912 NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe 85 PID 4836 wrote to memory of 2208 4836 MSWDM.EXE 86 PID 4836 wrote to memory of 2208 4836 MSWDM.EXE 86 PID 4836 wrote to memory of 2208 4836 MSWDM.EXE 86 PID 4836 wrote to memory of 1860 4836 MSWDM.EXE 87 PID 4836 wrote to memory of 1860 4836 MSWDM.EXE 87 PID 4836 wrote to memory of 1860 4836 MSWDM.EXE 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4512
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev290F.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.719c0791f626c70d0c5cb4c43e83fa90.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\NEAS.719C0791F626C70D0C5CB4C43E83FA90.EXE
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev290F.tmp!C:\Users\Admin\AppData\Local\Temp\NEAS.719C0791F626C70D0C5CB4C43E83FA90.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
267KB
MD50aca39b7baf56e60758ef03aec547794
SHA1e685bc1f0c6e9820d7ca0cdf7d4e50529ca6af54
SHA256d4800cbf6d3e06a43808d853c94091ce97eda4424f6e1b2c13f653649c236dff
SHA512489d95d2ee67fe8c7b2db14b6dac378a95f5a5a0fa9c23d2a1934d04e2fa43aa8c9aae33bcfd8cc21f3b91530a0474521aaacc7e5876400725051852f8066357
-
Filesize
267KB
MD50aca39b7baf56e60758ef03aec547794
SHA1e685bc1f0c6e9820d7ca0cdf7d4e50529ca6af54
SHA256d4800cbf6d3e06a43808d853c94091ce97eda4424f6e1b2c13f653649c236dff
SHA512489d95d2ee67fe8c7b2db14b6dac378a95f5a5a0fa9c23d2a1934d04e2fa43aa8c9aae33bcfd8cc21f3b91530a0474521aaacc7e5876400725051852f8066357
-
Filesize
11KB
MD59feff3c663336f7a555698bc2bc26f15
SHA12ae180fb131802e91922a153e3c497b807b4cd08
SHA2568c6644f3623291ca88b8a6926093f75b21f3f3dcdb79cbce72205f295267b96c
SHA51239c4f4db4fac609847a6c61f3c66828b9dd8a703043e7d6b7d07f71968c25625fedc84a110e6fed104bef278c585ddd497604452ef13b6d6927cc4bf08c96dbf
-
Filesize
267KB
MD50aca39b7baf56e60758ef03aec547794
SHA1e685bc1f0c6e9820d7ca0cdf7d4e50529ca6af54
SHA256d4800cbf6d3e06a43808d853c94091ce97eda4424f6e1b2c13f653649c236dff
SHA512489d95d2ee67fe8c7b2db14b6dac378a95f5a5a0fa9c23d2a1934d04e2fa43aa8c9aae33bcfd8cc21f3b91530a0474521aaacc7e5876400725051852f8066357
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
256KB
MD58a1198209520897514a2d82a912a66d2
SHA15dda8ec47f948814d808cd71e89ebe65940a1ff7
SHA2565ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0
SHA5129a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00
-
Filesize
11KB
MD59feff3c663336f7a555698bc2bc26f15
SHA12ae180fb131802e91922a153e3c497b807b4cd08
SHA2568c6644f3623291ca88b8a6926093f75b21f3f3dcdb79cbce72205f295267b96c
SHA51239c4f4db4fac609847a6c61f3c66828b9dd8a703043e7d6b7d07f71968c25625fedc84a110e6fed104bef278c585ddd497604452ef13b6d6927cc4bf08c96dbf