Analysis Overview
SHA256
bd819046e656758679030e88d7c38cc1d80100b139ecd0d54261c3a342755f2a
Threat Level: Known bad
The file NEAS.7309032da4216217efc9a7196dd643e0.exe was found to be: Known bad.
Malicious Activity Summary
Strela
Unsigned PE
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2023-11-01 14:12
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2023-11-01 14:12
Reported
2023-11-01 18:31
Platform
win10v2004-20231023-en
Max time kernel
145s
Max time network
151s
Command Line
Signatures
Strela
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeManageVolumePrivilege | N/A | C:\Windows\System32\svchost.exe | N/A |
Processes
C:\Windows\system32\regsvr32.exe
regsvr32 /s C:\Users\Admin\AppData\Local\Temp\NEAS.7309032da4216217efc9a7196dd643e0.dll
C:\Windows\system32\rundll32.exe
"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k UnistackSvcGroup
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 71.121.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.136.104.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.228.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 155.245.36.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.200:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 135.1.85.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 119.110.54.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 208.194.73.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 8.3.197.209.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 70.121.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.98.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 126.21.238.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 254.211.247.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 126.24.238.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 112.208.253.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 23.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 8.173.189.20.in-addr.arpa | udp |
Files
memory/3868-0-0x0000000000FD0000-0x0000000000FF1000-memory.dmp
memory/3868-1-0x000000006D7C0000-0x000000006DBAE000-memory.dmp
memory/3868-2-0x0000000000FD0000-0x0000000000FF1000-memory.dmp
memory/5040-3-0x00000125B3940000-0x00000125B3950000-memory.dmp
memory/5040-19-0x00000125B3A40000-0x00000125B3A50000-memory.dmp
memory/5040-35-0x00000125BD000000-0x00000125BD001000-memory.dmp
memory/5040-36-0x00000125BD020000-0x00000125BD021000-memory.dmp
memory/5040-37-0x00000125BD020000-0x00000125BD021000-memory.dmp
memory/5040-38-0x00000125BD020000-0x00000125BD021000-memory.dmp
memory/5040-39-0x00000125BD020000-0x00000125BD021000-memory.dmp
memory/5040-40-0x00000125BD020000-0x00000125BD021000-memory.dmp
memory/5040-41-0x00000125BD020000-0x00000125BD021000-memory.dmp
memory/5040-42-0x00000125BD020000-0x00000125BD021000-memory.dmp
memory/5040-43-0x00000125BD020000-0x00000125BD021000-memory.dmp
memory/5040-44-0x00000125BD020000-0x00000125BD021000-memory.dmp
memory/5040-45-0x00000125BD020000-0x00000125BD021000-memory.dmp
memory/5040-46-0x00000125BBC50000-0x00000125BBC51000-memory.dmp
memory/5040-47-0x00000125BBC40000-0x00000125BBC41000-memory.dmp
memory/5040-49-0x00000125BBC50000-0x00000125BBC51000-memory.dmp
memory/5040-52-0x00000125BBC40000-0x00000125BBC41000-memory.dmp
memory/5040-55-0x00000125BBB80000-0x00000125BBB81000-memory.dmp
C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm
| MD5 | 1b920494436138890d45c032479de4ac |
| SHA1 | fd799c3e5aa623bb50f73250dc475262fa1e31f4 |
| SHA256 | d9a30126532a51bafaf18808b588d6234c1cdd1821ea56bf7b4b6a314f9c85de |
| SHA512 | 4f06995948c6b18c52258c69b26f3d43207852b0a6b67bf526e8c80bfb97e0c5244b5d6cbff9c4fb3f94275f751111ad50f6b2dcd03713340f75c48a9e8b786a |
memory/5040-67-0x00000125BBD80000-0x00000125BBD81000-memory.dmp
memory/5040-69-0x00000125BBD90000-0x00000125BBD91000-memory.dmp
memory/5040-70-0x00000125BBD90000-0x00000125BBD91000-memory.dmp
memory/5040-71-0x00000125BBEA0000-0x00000125BBEA1000-memory.dmp
memory/5040-72-0x00000125BBDB0000-0x00000125BBDB1000-memory.dmp
memory/5040-73-0x00000125BBDA0000-0x00000125BBDA1000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2023-11-01 14:12
Reported
2023-11-01 18:30
Platform
win7-20231025-en
Max time kernel
121s
Max time network
134s
Command Line
Signatures
Strela
Processes
C:\Windows\system32\regsvr32.exe
regsvr32 /s C:\Users\Admin\AppData\Local\Temp\NEAS.7309032da4216217efc9a7196dd643e0.dll
Network
Files
memory/1764-0-0x00000000005A0000-0x00000000005C1000-memory.dmp
memory/1764-1-0x000000006D7C0000-0x000000006DBAE000-memory.dmp
memory/1764-2-0x00000000005A0000-0x00000000005C1000-memory.dmp