Analysis
-
max time kernel
163s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2023, 07:42
Behavioral task
behavioral1
Sample
NEAS.e2bf71ea3e0d65793793ff14da668600.exe
Resource
win7-20231023-en
5 signatures
150 seconds
General
-
Target
NEAS.e2bf71ea3e0d65793793ff14da668600.exe
-
Size
2.2MB
-
MD5
e2bf71ea3e0d65793793ff14da668600
-
SHA1
cd1fa35e9489e247aed6fb016cd4b26634ce86bd
-
SHA256
b7b23e7e5129c6562a21bed20c8d9c2f62e3c56cda6524d8b96fb048632a2879
-
SHA512
0d056a663b084b083b2ae443cc53e2df6a6955c476f1be1df9987096f2a5ad42c1f6f42f4a0ea2947fc17d974b54b20bdb089deaa728cefc764681e7d02be156
-
SSDEEP
49152:M1K3cmsvMwMxEKHWB+28B942wnZxXJMNcDxngRPh/Xn4gJOtUUFrKMe9fV:Mo1shMWKHC+H9dwnZxXeNcDxnYPh/X4O
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3688-0-0x0000000000BE0000-0x0000000000FDF000-memory.dmp upx behavioral2/memory/3688-1-0x0000000000BE0000-0x0000000000FDF000-memory.dmp upx behavioral2/memory/3688-2-0x0000000000BE0000-0x0000000000FDF000-memory.dmp upx behavioral2/memory/3688-3-0x0000000000BE0000-0x0000000000FDF000-memory.dmp upx behavioral2/memory/3688-4-0x0000000000BE0000-0x0000000000FDF000-memory.dmp upx behavioral2/memory/3688-6-0x0000000000BE0000-0x0000000000FDF000-memory.dmp upx behavioral2/memory/3688-7-0x0000000000BE0000-0x0000000000FDF000-memory.dmp upx behavioral2/memory/3688-8-0x0000000000BE0000-0x0000000000FDF000-memory.dmp upx behavioral2/memory/3688-9-0x0000000000BE0000-0x0000000000FDF000-memory.dmp upx behavioral2/memory/3688-10-0x0000000000BE0000-0x0000000000FDF000-memory.dmp upx behavioral2/memory/3688-11-0x0000000000BE0000-0x0000000000FDF000-memory.dmp upx behavioral2/memory/3688-12-0x0000000000BE0000-0x0000000000FDF000-memory.dmp upx behavioral2/memory/3688-13-0x0000000000BE0000-0x0000000000FDF000-memory.dmp upx behavioral2/memory/3688-14-0x0000000000BE0000-0x0000000000FDF000-memory.dmp upx behavioral2/memory/3688-15-0x0000000000BE0000-0x0000000000FDF000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1304 sc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3688 wrote to memory of 3568 3688 NEAS.e2bf71ea3e0d65793793ff14da668600.exe 87 PID 3688 wrote to memory of 3568 3688 NEAS.e2bf71ea3e0d65793793ff14da668600.exe 87 PID 3568 wrote to memory of 1304 3568 cmd.exe 89 PID 3568 wrote to memory of 1304 3568 cmd.exe 89 PID 3688 wrote to memory of 1592 3688 NEAS.e2bf71ea3e0d65793793ff14da668600.exe 90 PID 3688 wrote to memory of 1592 3688 NEAS.e2bf71ea3e0d65793793ff14da668600.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.e2bf71ea3e0d65793793ff14da668600.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e2bf71ea3e0d65793793ff14da668600.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\system32\cmd.execmd /c sc stop IxijyXWUAUServYMHv2⤵
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\system32\sc.exesc stop IxijyXWUAUServYMHv3⤵
- Launches sc.exe
PID:1304
-
-
-
C:\Windows\system32\cmd.execmd /c del c:\windows\yarfn.exe2⤵PID:1592
-