Analysis

  • max time kernel
    98s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    03/11/2023, 10:08

General

  • Target

    NEAS.95210cad7322916be7e09742fa29ab80.exe

  • Size

    2.2MB

  • MD5

    95210cad7322916be7e09742fa29ab80

  • SHA1

    613eab8f76be276b6370d0e77bab5631fe7b2b3d

  • SHA256

    fb0b6be19c64042b11ec01d73d968cf717b12c0b6d6c6eab4c82a2b751f3ee3a

  • SHA512

    e1c7127674c61df87a9367a775d854b8220527a6f689f55589b324ccac9ca2cf7d1ce2d47eb4c94d7cd2537471f98d124029175ff2b72d1944796c650a86e648

  • SSDEEP

    24576:PCM+w0R35u8vSoYhE2D1Su4fsBcZ0prTtqsxaxcAhLIVZZk4HLMn5/njEwhRII0H:PCMdU34SS7hE2pSNfEc8CycLHFlA

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Modifies registry key 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.95210cad7322916be7e09742fa29ab80.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.95210cad7322916be7e09742fa29ab80.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Users\Admin\BiQUcwUc\qWsccAQg.exe
      "C:\Users\Admin\BiQUcwUc\qWsccAQg.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      PID:1464
    • C:\ProgramData\gWUscgAg\aoAIQwoQ.exe
      "C:\ProgramData\gWUscgAg\aoAIQwoQ.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2164
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "C:\Users\Admin\AppData\Local\Temp\NEAS.95210cad7322916be7e09742fa29ab80"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2576
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\NEAS.95210cad7322916be7e09742fa29ab80
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2000
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\NEAS.95210cad7322916be7e09742fa29ab80"
          4⤵
          • Suspicious use of SetWindowsHookEx
          PID:2788
    • C:\Windows\SysWOW64\reg.exe
      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies registry key
      PID:2440
    • C:\Windows\SysWOW64\reg.exe
      reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
      2⤵
      • UAC bypass
      • Modifies registry key
      PID:2904
    • C:\Windows\SysWOW64\reg.exe
      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
      2⤵
      • Modifies registry key
      PID:2896
  • C:\ProgramData\QOIIccgs\GEYUUIYk.exe
    C:\ProgramData\QOIIccgs\GEYUUIYk.exe
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    • Drops file in System32 directory
    PID:2352
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2236

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe

          Filesize

          3.1MB

          MD5

          59a0480b6282723785f74d2aa208de32

          SHA1

          14a51fb8cf1cb315c1f04ee61d58263a5a68aef9

          SHA256

          4b01f84592d4cccc305d3cf753946dbf7ff49dc80d392a84d0ca621953b9774f

          SHA512

          77eecc2dc35a6361e164aa6430aa3da69d14299a726dd18591c120e592003aa79471a19f84ecc509826f3e28d02bc7e433eb411804cfc761f47e6f258db535fe

        • C:\ProgramData\QOIIccgs\GEYUUIYk.exe

          Filesize

          2.0MB

          MD5

          48c418e527829aafdaccdfe4e2576bd9

          SHA1

          bdfb9d159257c37294d3e3a5b9a46eeeda3c3538

          SHA256

          4c5970485b2c5cac5f5f8005afcb1896cbeb7cb88e1fc9e797291c3991c61490

          SHA512

          7e7766d4bc6b2debccfa340aff12c213f97623cc18e2c1fdd03745b37c77ed55920e859e36ce3f7c8c708edba823fb506f203791ed7fe8c3b5a0dd2fae17c9e8

        • C:\ProgramData\gWUscgAg\aoAIQwoQ.exe

          Filesize

          1.9MB

          MD5

          e5c79d6f5dd001e394d575b60b4eed49

          SHA1

          14e05e0ba6aaf4c41b6de3cad93f0511ce4379ea

          SHA256

          a7ccb796ad90f7c4c30f4cb5f69843801590d5b4dacea3c0887239b78848fc26

          SHA512

          16efeba6b4e0d3817a87af1a1f4678ea4f0bbc20c20e75320216b5c888e524bedcf4f02f0b78f57094a8194accfedf0d7c211a40db44a2bff0eccd3c83c1aa3c

        • C:\ProgramData\gWUscgAg\aoAIQwoQ.exe

          Filesize

          1.9MB

          MD5

          e5c79d6f5dd001e394d575b60b4eed49

          SHA1

          14e05e0ba6aaf4c41b6de3cad93f0511ce4379ea

          SHA256

          a7ccb796ad90f7c4c30f4cb5f69843801590d5b4dacea3c0887239b78848fc26

          SHA512

          16efeba6b4e0d3817a87af1a1f4678ea4f0bbc20c20e75320216b5c888e524bedcf4f02f0b78f57094a8194accfedf0d7c211a40db44a2bff0eccd3c83c1aa3c

        • C:\ProgramData\gWUscgAg\aoAIQwoQ.exe

          Filesize

          1.9MB

          MD5

          e5c79d6f5dd001e394d575b60b4eed49

          SHA1

          14e05e0ba6aaf4c41b6de3cad93f0511ce4379ea

          SHA256

          a7ccb796ad90f7c4c30f4cb5f69843801590d5b4dacea3c0887239b78848fc26

          SHA512

          16efeba6b4e0d3817a87af1a1f4678ea4f0bbc20c20e75320216b5c888e524bedcf4f02f0b78f57094a8194accfedf0d7c211a40db44a2bff0eccd3c83c1aa3c

        • C:\Users\Admin\AppData\Local\Temp\DOMocEwM.bat

          Filesize

          4B

          MD5

          38e7ffbb59b19fa21384862af4f95c22

          SHA1

          0077b3646e146cb9018f6499473ce8faf7209fbe

          SHA256

          2c0d24b965d355b70f60488df69ac8d673130e5b33ef7b4c4b7931a8b21a243b

          SHA512

          b554ff83aefa36e1dea8a184d5834dfcd406cf52cf9644b15615157e2d361b2ac20fb9e074516cb4eaa44039f80db1e4383f7d46fb4e098d2b5f47718a366bf4

        • C:\Users\Admin\AppData\Local\Temp\NEAS.95210cad7322916be7e09742fa29ab80

          Filesize

          156KB

          MD5

          710f1ed2c90ccc155674e94cc87a9c89

          SHA1

          83ddda43c33e861a1e22e8c218f879211c6669e4

          SHA256

          7cb9d7b1a19351a396d62548f8f0d7eee4f24fb0c8f2e4cf3062d83eaa19b848

          SHA512

          66175995cb2fd53ec10b7382ad7225a3517b66ad1a738eece7021a306e16291b02f7d8a0ed72ef048c591570f075412c81c092a3a3fef9012cec59092b133a5d

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          2bf436764c8720f9f1d2b382db60f40e

          SHA1

          1c92d40d84e0f8593d1eec82beddecc7f1de7c2e

          SHA256

          d65a299f1137cf0d758cdc1cf2c9c285123746f386584834a86595f1c8966286

          SHA512

          51bfb7e4b19021d75924e73d33bf4595ba8b5322f4d6c6990bcf44d0bb98c048e22dfae8b4d6ed8ec4a29d8720724cb0d2a69c1aabdf36530bc0a02496921c2c

        • C:\Users\Admin\BiQUcwUc\qWsccAQg.exe

          Filesize

          2.0MB

          MD5

          8f04dcfdeb7ee6f4a87ba6126e69a88f

          SHA1

          dd7555ecf91e01183284b14f736141b53911d561

          SHA256

          4d55635c70069a2549240c122b06402b9e63e984c8bb33a0418ee6dddb1287f2

          SHA512

          92871fa6ba90414b26adeb5000b484730a604da63f4950bf58baa26c49f1fa534cbeb74a7d4dbee61c3669b3a38740f85e98ddd33898916d16d33fecc49fb856

        • C:\Users\Admin\BiQUcwUc\qWsccAQg.exe

          Filesize

          2.0MB

          MD5

          8f04dcfdeb7ee6f4a87ba6126e69a88f

          SHA1

          dd7555ecf91e01183284b14f736141b53911d561

          SHA256

          4d55635c70069a2549240c122b06402b9e63e984c8bb33a0418ee6dddb1287f2

          SHA512

          92871fa6ba90414b26adeb5000b484730a604da63f4950bf58baa26c49f1fa534cbeb74a7d4dbee61c3669b3a38740f85e98ddd33898916d16d33fecc49fb856

        • \MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exe

          Filesize

          145KB

          MD5

          9d10f99a6712e28f8acd5641e3a7ea6b

          SHA1

          835e982347db919a681ba12f3891f62152e50f0d

          SHA256

          70964a0ed9011ea94044e15fa77edd9cf535cc79ed8e03a3721ff007e69595cc

          SHA512

          2141ee5c07aa3e038360013e3f40969e248bed05022d161b992df61f21934c5574ed9d3094ffd5245f5afd84815b24f80bda30055cf4d374f9c6254e842f6bd5

        • \MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe

          Filesize

          1.0MB

          MD5

          4d92f518527353c0db88a70fddcfd390

          SHA1

          c4baffc19e7d1f0e0ebf73bab86a491c1d152f98

          SHA256

          97e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c

          SHA512

          05a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452

        • \MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe

          Filesize

          1.0MB

          MD5

          4d92f518527353c0db88a70fddcfd390

          SHA1

          c4baffc19e7d1f0e0ebf73bab86a491c1d152f98

          SHA256

          97e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c

          SHA512

          05a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452

        • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXE

          Filesize

          818KB

          MD5

          a41e524f8d45f0074fd07805ff0c9b12

          SHA1

          948deacf95a60c3fdf17e0e4db1931a6f3fc5d38

          SHA256

          082329648337e5ba7377fed9d8a178809f37eecb8d795b93cca4ec07d8640ff7

          SHA512

          91bf4be7e82536a85a840dbc9f3ce7b7927d1cedf6391aac93989abae210620433e685b86a12d133a72369a4f8a665c46ac7fc9e8a806e2872d8b1514cbb305f

        • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXE

          Filesize

          818KB

          MD5

          a41e524f8d45f0074fd07805ff0c9b12

          SHA1

          948deacf95a60c3fdf17e0e4db1931a6f3fc5d38

          SHA256

          082329648337e5ba7377fed9d8a178809f37eecb8d795b93cca4ec07d8640ff7

          SHA512

          91bf4be7e82536a85a840dbc9f3ce7b7927d1cedf6391aac93989abae210620433e685b86a12d133a72369a4f8a665c46ac7fc9e8a806e2872d8b1514cbb305f

        • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.exe

          Filesize

          507KB

          MD5

          c87e561258f2f8650cef999bf643a731

          SHA1

          2c64b901284908e8ed59cf9c912f17d45b05e0af

          SHA256

          a1dfa6639bef3cb4e41175c43730d46a51393942ead826337ca9541ac210c67b

          SHA512

          dea4833aa712c5823f800f5f5a2adcf241c1b2b6747872f540f5ff9da6795c4ddb73db0912593337083c7c67b91e9eaf1b3d39a34b99980fd5904ba3d7d62f6c

        • \ProgramData\gWUscgAg\aoAIQwoQ.exe

          Filesize

          1.9MB

          MD5

          e5c79d6f5dd001e394d575b60b4eed49

          SHA1

          14e05e0ba6aaf4c41b6de3cad93f0511ce4379ea

          SHA256

          a7ccb796ad90f7c4c30f4cb5f69843801590d5b4dacea3c0887239b78848fc26

          SHA512

          16efeba6b4e0d3817a87af1a1f4678ea4f0bbc20c20e75320216b5c888e524bedcf4f02f0b78f57094a8194accfedf0d7c211a40db44a2bff0eccd3c83c1aa3c

        • \ProgramData\gWUscgAg\aoAIQwoQ.exe

          Filesize

          1.9MB

          MD5

          e5c79d6f5dd001e394d575b60b4eed49

          SHA1

          14e05e0ba6aaf4c41b6de3cad93f0511ce4379ea

          SHA256

          a7ccb796ad90f7c4c30f4cb5f69843801590d5b4dacea3c0887239b78848fc26

          SHA512

          16efeba6b4e0d3817a87af1a1f4678ea4f0bbc20c20e75320216b5c888e524bedcf4f02f0b78f57094a8194accfedf0d7c211a40db44a2bff0eccd3c83c1aa3c

        • \ProgramData\gWUscgAg\aoAIQwoQ.exe

          Filesize

          1.9MB

          MD5

          e5c79d6f5dd001e394d575b60b4eed49

          SHA1

          14e05e0ba6aaf4c41b6de3cad93f0511ce4379ea

          SHA256

          a7ccb796ad90f7c4c30f4cb5f69843801590d5b4dacea3c0887239b78848fc26

          SHA512

          16efeba6b4e0d3817a87af1a1f4678ea4f0bbc20c20e75320216b5c888e524bedcf4f02f0b78f57094a8194accfedf0d7c211a40db44a2bff0eccd3c83c1aa3c

        • \Users\Admin\BiQUcwUc\qWsccAQg.exe

          Filesize

          2.0MB

          MD5

          8f04dcfdeb7ee6f4a87ba6126e69a88f

          SHA1

          dd7555ecf91e01183284b14f736141b53911d561

          SHA256

          4d55635c70069a2549240c122b06402b9e63e984c8bb33a0418ee6dddb1287f2

          SHA512

          92871fa6ba90414b26adeb5000b484730a604da63f4950bf58baa26c49f1fa534cbeb74a7d4dbee61c3669b3a38740f85e98ddd33898916d16d33fecc49fb856

        • \Users\Admin\BiQUcwUc\qWsccAQg.exe

          Filesize

          2.0MB

          MD5

          8f04dcfdeb7ee6f4a87ba6126e69a88f

          SHA1

          dd7555ecf91e01183284b14f736141b53911d561

          SHA256

          4d55635c70069a2549240c122b06402b9e63e984c8bb33a0418ee6dddb1287f2

          SHA512

          92871fa6ba90414b26adeb5000b484730a604da63f4950bf58baa26c49f1fa534cbeb74a7d4dbee61c3669b3a38740f85e98ddd33898916d16d33fecc49fb856

        • memory/1464-26-0x00000000002D0000-0x0000000000339000-memory.dmp

          Filesize

          420KB

        • memory/1464-34-0x0000000000400000-0x00000000005FB000-memory.dmp

          Filesize

          2.0MB

        • memory/1464-11-0x00000000002D0000-0x0000000000339000-memory.dmp

          Filesize

          420KB

        • memory/1464-13-0x0000000000400000-0x00000000005FB000-memory.dmp

          Filesize

          2.0MB

        • memory/2164-27-0x0000000000400000-0x00000000005EA000-memory.dmp

          Filesize

          1.9MB

        • memory/2164-40-0x0000000000220000-0x0000000000243000-memory.dmp

          Filesize

          140KB

        • memory/2164-43-0x0000000000400000-0x00000000005EA000-memory.dmp

          Filesize

          1.9MB

        • memory/2164-25-0x0000000000220000-0x0000000000243000-memory.dmp

          Filesize

          140KB

        • memory/2248-12-0x0000000000400000-0x000000000062E000-memory.dmp

          Filesize

          2.2MB

        • memory/2248-0-0x00000000001B0000-0x00000000001CB000-memory.dmp

          Filesize

          108KB

        • memory/2248-1-0x0000000000400000-0x000000000062E000-memory.dmp

          Filesize

          2.2MB

        • memory/2248-10-0x00000000001B0000-0x00000000001CB000-memory.dmp

          Filesize

          108KB

        • memory/2352-39-0x0000000000A30000-0x0000000000AC3000-memory.dmp

          Filesize

          588KB

        • memory/2352-78-0x0000000000400000-0x0000000000609000-memory.dmp

          Filesize

          2.0MB

        • memory/2352-74-0x0000000000A30000-0x0000000000AC3000-memory.dmp

          Filesize

          588KB

        • memory/2352-41-0x0000000000400000-0x0000000000609000-memory.dmp

          Filesize

          2.0MB