Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
02/11/2023, 19:19
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.66c1d08667f4f3eec4fa85848c3e0ee0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.66c1d08667f4f3eec4fa85848c3e0ee0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.66c1d08667f4f3eec4fa85848c3e0ee0.exe
-
Size
392KB
-
MD5
66c1d08667f4f3eec4fa85848c3e0ee0
-
SHA1
6a7414a10d1bf06eea71284d0f6f72d64db72c08
-
SHA256
e8219fa5b8c8e883153bd770544de7d212b2bc202e49a4d1cfca7cbb45b8912e
-
SHA512
8c89f8c53d1f665009aef5fb7843a0694a8d6cd485f5f163bde1e90ce0bce787ed400c00ab0fdf1814a90dd2cd97ecea46cd24b50188b29e03f663f613fa78d7
-
SSDEEP
6144:C7ASJKenie2xT2NU2OTFQb8Fb0I1UfFmPGL:Cl5nilTFQbI0a+GGL
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelPowerAgent5 = "rundll32.exe shell32.dll, ShellExec_RunDLL C:\\PROGRA~3\\2DJJ6H~1.EXE" svchost.exe -
Checks for any installed AV software in registry 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Eset\Nod svchost.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Avira svchost.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\AVAST Software\Avast svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2164 set thread context of 2056 2164 NEAS.66c1d08667f4f3eec4fa85848c3e0ee0.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe 2056 svchost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2056 2164 NEAS.66c1d08667f4f3eec4fa85848c3e0ee0.exe 28 PID 2164 wrote to memory of 2056 2164 NEAS.66c1d08667f4f3eec4fa85848c3e0ee0.exe 28 PID 2164 wrote to memory of 2056 2164 NEAS.66c1d08667f4f3eec4fa85848c3e0ee0.exe 28 PID 2164 wrote to memory of 2056 2164 NEAS.66c1d08667f4f3eec4fa85848c3e0ee0.exe 28 PID 2164 wrote to memory of 2056 2164 NEAS.66c1d08667f4f3eec4fa85848c3e0ee0.exe 28 PID 2164 wrote to memory of 2056 2164 NEAS.66c1d08667f4f3eec4fa85848c3e0ee0.exe 28 PID 2164 wrote to memory of 2056 2164 NEAS.66c1d08667f4f3eec4fa85848c3e0ee0.exe 28 PID 2164 wrote to memory of 2056 2164 NEAS.66c1d08667f4f3eec4fa85848c3e0ee0.exe 28 PID 2164 wrote to memory of 2056 2164 NEAS.66c1d08667f4f3eec4fa85848c3e0ee0.exe 28 PID 2164 wrote to memory of 2056 2164 NEAS.66c1d08667f4f3eec4fa85848c3e0ee0.exe 28 PID 2164 wrote to memory of 2056 2164 NEAS.66c1d08667f4f3eec4fa85848c3e0ee0.exe 28 PID 2164 wrote to memory of 2056 2164 NEAS.66c1d08667f4f3eec4fa85848c3e0ee0.exe 28 PID 2164 wrote to memory of 2488 2164 NEAS.66c1d08667f4f3eec4fa85848c3e0ee0.exe 29 PID 2164 wrote to memory of 2488 2164 NEAS.66c1d08667f4f3eec4fa85848c3e0ee0.exe 29 PID 2164 wrote to memory of 2488 2164 NEAS.66c1d08667f4f3eec4fa85848c3e0ee0.exe 29 PID 2164 wrote to memory of 2488 2164 NEAS.66c1d08667f4f3eec4fa85848c3e0ee0.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.66c1d08667f4f3eec4fa85848c3e0ee0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.66c1d08667f4f3eec4fa85848c3e0ee0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\svchost.exeC:\ProgramData\2djj6h80b0.exe2⤵
- Adds Run key to start application
- Checks for any installed AV software in registry
- Suspicious behavior: EnumeratesProcesses
PID:2056
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\smm3CC5.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\NEAS.66c1d08667f4f3eec4fa85848c3e0ee0.exe""2⤵PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30B
MD5791973b922dc93149d4145b2018cdca4
SHA12441e4f7ccf936d7f87ba258e401b37567940ef9
SHA25676037670697d6ad1b3f8b32cfa8ac8b3176b6042add533e0152030d22689c778
SHA512f4fbe401d79bf6154135690391c5b492c55490f484f22be89dac09c9feaa32f40c9009ea0a2feebd93edb8c6fa55ad74a2f7aaa303731d2a63b746e537e8875f
-
Filesize
30B
MD5791973b922dc93149d4145b2018cdca4
SHA12441e4f7ccf936d7f87ba258e401b37567940ef9
SHA25676037670697d6ad1b3f8b32cfa8ac8b3176b6042add533e0152030d22689c778
SHA512f4fbe401d79bf6154135690391c5b492c55490f484f22be89dac09c9feaa32f40c9009ea0a2feebd93edb8c6fa55ad74a2f7aaa303731d2a63b746e537e8875f