Analysis
-
max time kernel
161s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2023, 08:57
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d3eb98213274551f74738479864915e0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.d3eb98213274551f74738479864915e0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.d3eb98213274551f74738479864915e0.exe
-
Size
119KB
-
MD5
d3eb98213274551f74738479864915e0
-
SHA1
3dc95038f558c5c5e3cc1b09e73e63bd26e16b19
-
SHA256
98f74c7a34f8437b03d5043ade8d2ef422c45cbd6864dad5778dfcc94760fab7
-
SHA512
dad0f9ef8a7a4afc76917ee46a19dc4fa68439b868881727452303e19c3f95f99f8019819a8e20475d0c9480869776eb7820aebf2899ff7be7d50d6c1c280041
-
SSDEEP
3072:GtwgYJ6IS9wu3uDrsge6etpZxpvI4dZ+r+pukf06N:bpSForUpgSgEcg
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2328 urdvxc.exe -
Executes dropped EXE 4 IoCs
pid Process 2660 urdvxc.exe 3064 urdvxc.exe 4920 urdvxc.exe 2328 urdvxc.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\urdvxc.exe urdvxc.exe File created C:\Windows\SysWOW64\urdvxc.exe NEAS.d3eb98213274551f74738479864915e0.exe File opened for modification C:\Windows\SysWOW64\urdvxc.exe NEAS.d3eb98213274551f74738479864915e0.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\1033\README.HTM urdvxc.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\1033\MCABOUT.HTM urdvxc.exe File opened for modification C:\Program Files\Java\jdk-1.8\README.html urdvxc.exe File opened for modification C:\Program Files\Java\jre-1.8\Welcome.html urdvxc.exe File opened for modification C:\Program Files\Java\jre-1.8\hcjzqenb.exe urdvxc.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPP.HTM urdvxc.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\tsbknceh.exe urdvxc.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\Welcome.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\revhnlhn.exe urdvxc.exe File opened for modification C:\Program Files\Java\jdk-1.8\chllsvtv.exe urdvxc.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\PersonaSpy.html urdvxc.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\1033\rvhrjtnt.exe urdvxc.exe -
Modifies registry class 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\ = "xntnrqlnstezsekb" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5DA7E191-3518-8C5E-DAD0-E316016B7509}\LocalServer32 urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D72C442F-6EA9-BFAF-2703-0F262F8765FD}\LocalServer32\ = "C:\\Program Files\\Java\\jdk-1.8\\chllsvtv.exe" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AC84F518-2B78-BCFB-E876-EDAE640549C3}\ = "qtlnezwsklhrknet" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32\ = "C:\\Windows\\SysWOW64\\urdvxc.exe" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EB4470BE-3A35-A218-C7F6-4398C8694892} urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{266059B9-2EC0-EB8A-365B-4EFBAA41D8A4} NEAS.d3eb98213274551f74738479864915e0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84} urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\ = "hzwevttzqelrllnq" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32 urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5DA7E191-3518-8C5E-DAD0-E316016B7509}\LocalServer32\ = "C:\\Program Files\\Java\\jdk-1.8\\jre\\revhnlhn.exe" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AC84F518-2B78-BCFB-E876-EDAE640549C3}\LocalServer32\ = "C:\\Program Files\\Java\\jre-1.8\\hcjzqenb.exe" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EB4470BE-3A35-A218-C7F6-4398C8694892}\LocalServer32\ = "C:\\Program Files\\Microsoft Office\\root\\vfs\\ProgramFilesCommonX64\\Microsoft Shared\\Smart Tag\\1033\\rvhrjtnt.exe" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{266059B9-2EC0-EB8A-365B-4EFBAA41D8A4}\LocalServer32 NEAS.d3eb98213274551f74738479864915e0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32 urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32\ = "C:\\Windows\\SysWOW64\\urdvxc.exe" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5DA7E191-3518-8C5E-DAD0-E316016B7509}\ = "kehtljlbxtxhnelt" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AC84F518-2B78-BCFB-E876-EDAE640549C3} urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D9E5B2A0-6DA4-8211-3F09-7196AABBE564} urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{266059B9-2EC0-EB8A-365B-4EFBAA41D8A4}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.d3eb98213274551f74738479864915e0.exe" NEAS.d3eb98213274551f74738479864915e0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32 urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32\ = "C:\\Windows\\SysWOW64\\urdvxc.exe" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32 urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\ = "rtnbkwnvrltknjnt" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D72C442F-6EA9-BFAF-2703-0F262F8765FD} urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D72C442F-6EA9-BFAF-2703-0F262F8765FD}\LocalServer32 urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{266059B9-2EC0-EB8A-365B-4EFBAA41D8A4}\ = "ejkblktnttvlewxn" NEAS.d3eb98213274551f74738479864915e0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84} urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84} urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5DA7E191-3518-8C5E-DAD0-E316016B7509} urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D9E5B2A0-6DA4-8211-3F09-7196AABBE564}\LocalServer32 urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EB4470BE-3A35-A218-C7F6-4398C8694892}\LocalServer32 urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D72C442F-6EA9-BFAF-2703-0F262F8765FD}\ = "ewzzjlckszqcehlj" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AC84F518-2B78-BCFB-E876-EDAE640549C3}\LocalServer32 urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D9E5B2A0-6DA4-8211-3F09-7196AABBE564}\ = "nxesvtkelqjnlksj" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D9E5B2A0-6DA4-8211-3F09-7196AABBE564}\LocalServer32\ = "C:\\Program Files\\Microsoft Office\\root\\Office16\\PersonaSpy\\tsbknceh.exe" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EB4470BE-3A35-A218-C7F6-4398C8694892}\ = "lsjezlerjeexcstr" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84} urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\ = "cjjetkrjeslhzqws" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32\ = "C:\\Windows\\SysWOW64\\urdvxc.exe" urdvxc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2660 urdvxc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3540 wrote to memory of 2660 3540 NEAS.d3eb98213274551f74738479864915e0.exe 90 PID 3540 wrote to memory of 2660 3540 NEAS.d3eb98213274551f74738479864915e0.exe 90 PID 3540 wrote to memory of 2660 3540 NEAS.d3eb98213274551f74738479864915e0.exe 90 PID 3540 wrote to memory of 3064 3540 NEAS.d3eb98213274551f74738479864915e0.exe 91 PID 3540 wrote to memory of 3064 3540 NEAS.d3eb98213274551f74738479864915e0.exe 91 PID 3540 wrote to memory of 3064 3540 NEAS.d3eb98213274551f74738479864915e0.exe 91 PID 3540 wrote to memory of 2328 3540 NEAS.d3eb98213274551f74738479864915e0.exe 93 PID 3540 wrote to memory of 2328 3540 NEAS.d3eb98213274551f74738479864915e0.exe 93 PID 3540 wrote to memory of 2328 3540 NEAS.d3eb98213274551f74738479864915e0.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d3eb98213274551f74738479864915e0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d3eb98213274551f74738479864915e0.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\urdvxc.exeC:\Windows\system32\urdvxc.exe /installservice2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Windows\SysWOW64\urdvxc.exeC:\Windows\system32\urdvxc.exe /start2⤵
- Executes dropped EXE
- Modifies registry class
PID:3064
-
-
C:\Windows\SysWOW64\urdvxc.exeC:\Windows\system32\urdvxc.exe /uninstallservice patch:C:\Users\Admin\AppData\Local\Temp\NEAS.d3eb98213274551f74738479864915e0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies registry class
PID:2328
-
-
C:\Windows\SysWOW64\urdvxc.exe"C:\Windows\SysWOW64\urdvxc.exe" /service1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
PID:4920
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD5d3eb98213274551f74738479864915e0
SHA13dc95038f558c5c5e3cc1b09e73e63bd26e16b19
SHA25698f74c7a34f8437b03d5043ade8d2ef422c45cbd6864dad5778dfcc94760fab7
SHA512dad0f9ef8a7a4afc76917ee46a19dc4fa68439b868881727452303e19c3f95f99f8019819a8e20475d0c9480869776eb7820aebf2899ff7be7d50d6c1c280041
-
Filesize
119KB
MD5d3eb98213274551f74738479864915e0
SHA13dc95038f558c5c5e3cc1b09e73e63bd26e16b19
SHA25698f74c7a34f8437b03d5043ade8d2ef422c45cbd6864dad5778dfcc94760fab7
SHA512dad0f9ef8a7a4afc76917ee46a19dc4fa68439b868881727452303e19c3f95f99f8019819a8e20475d0c9480869776eb7820aebf2899ff7be7d50d6c1c280041
-
Filesize
119KB
MD5d3eb98213274551f74738479864915e0
SHA13dc95038f558c5c5e3cc1b09e73e63bd26e16b19
SHA25698f74c7a34f8437b03d5043ade8d2ef422c45cbd6864dad5778dfcc94760fab7
SHA512dad0f9ef8a7a4afc76917ee46a19dc4fa68439b868881727452303e19c3f95f99f8019819a8e20475d0c9480869776eb7820aebf2899ff7be7d50d6c1c280041
-
Filesize
119KB
MD5d3eb98213274551f74738479864915e0
SHA13dc95038f558c5c5e3cc1b09e73e63bd26e16b19
SHA25698f74c7a34f8437b03d5043ade8d2ef422c45cbd6864dad5778dfcc94760fab7
SHA512dad0f9ef8a7a4afc76917ee46a19dc4fa68439b868881727452303e19c3f95f99f8019819a8e20475d0c9480869776eb7820aebf2899ff7be7d50d6c1c280041
-
Filesize
119KB
MD5d3eb98213274551f74738479864915e0
SHA13dc95038f558c5c5e3cc1b09e73e63bd26e16b19
SHA25698f74c7a34f8437b03d5043ade8d2ef422c45cbd6864dad5778dfcc94760fab7
SHA512dad0f9ef8a7a4afc76917ee46a19dc4fa68439b868881727452303e19c3f95f99f8019819a8e20475d0c9480869776eb7820aebf2899ff7be7d50d6c1c280041