Analysis
-
max time kernel
158s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2023, 15:41
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.505d95b2631feecee7c33bcd02e415a0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.505d95b2631feecee7c33bcd02e415a0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.505d95b2631feecee7c33bcd02e415a0.exe
-
Size
119KB
-
MD5
505d95b2631feecee7c33bcd02e415a0
-
SHA1
fecda142134db51d2ede9c9be0f0f6648515071b
-
SHA256
303a535019df334895e52688b5fad86b12b2a47cb46161aec1f3c7d52f793e79
-
SHA512
710de8619085a7c35483ea66221489f931a54398146835be996cd305705dd21a2577a43682b3941ff354469c0d87e8b01fd969220ae3c0df98cbf6d8eb49f1bc
-
SSDEEP
3072:GPy1hgK1z31oWLmqvLEDzqrj8JB+IfBtvd1BHB:vaQ1oWLm2LED+v8PfBpd1BHB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2180 urdvxc.exe -
Executes dropped EXE 5 IoCs
pid Process 1064 urdvxc.exe 3140 urdvxc.exe 3424 urdvxc.exe 2180 urdvxc.exe 1096 urdvxc.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\urdvxc.exe urdvxc.exe File created C:\Windows\SysWOW64\urdvxc.exe NEAS.505d95b2631feecee7c33bcd02e415a0.exe File opened for modification C:\Windows\SysWOW64\urdvxc.exe NEAS.505d95b2631feecee7c33bcd02e415a0.exe File created C:\Windows\SysWOW64\urdvxc.exe urdvxc.exe -
Drops file in Program Files directory 25 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\Welcome.html urdvxc.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\1033\rvhrjtnt.exe urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\stream_config_window.html urdvxc.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPP.HTM urdvxc.exe File opened for modification C:\Program Files\Java\jre-1.8\hcjzqenb.exe urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\stream_window.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk-1.8\README.html urdvxc.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPP.HTM urdvxc.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\1033\MCABOUT.HTM urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\equalizer_window.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\Welcome.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\revhnlhn.exe urdvxc.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\1033\README.HTM urdvxc.exe File opened for modification C:\Program Files\Java\jdk-1.8\chllsvtv.exe urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\mosaic_window.html urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\error_window.html urdvxc.exe File opened for modification C:\Program Files\Java\jre-1.8\Welcome.html urdvxc.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\tsbknceh.exe urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\browse_window.html urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\batch_window.html urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\create_stream.html urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\offset_window.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk-1.8\README.html urdvxc.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\PersonaSpy.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\Welcome.html urdvxc.exe -
Modifies registry class 44 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5DA7E191-3518-8C5E-DAD0-E316016B7509}\ = "rnvkcszcjexjctkk" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D72C442F-6EA9-BFAF-2703-0F262F8765FD}\LocalServer32\ = "C:\\Program Files\\Java\\jdk-1.8\\chllsvtv.exe" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AC84F518-2B78-BCFB-E876-EDAE640549C3}\LocalServer32\ = "C:\\Program Files\\Java\\jre-1.8\\hcjzqenb.exe" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D9E5B2A0-6DA4-8211-3F09-7196AABBE564}\LocalServer32\ = "C:\\Program Files\\Microsoft Office\\root\\Office16\\PersonaSpy\\tsbknceh.exe" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EB4470BE-3A35-A218-C7F6-4398C8694892}\ = "kllqntbjsbhttenk" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32\ = "C:\\Windows\\SysWOW64\\urdvxc.exe" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84} urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32 urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\ = "hqrtvnzkbhvchshj" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84} urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84} urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5420C6E-6D8F-5F08-5B45-446692F3C390}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.505d95b2631feecee7c33bcd02e415a0.exe" NEAS.505d95b2631feecee7c33bcd02e415a0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84} urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D9E5B2A0-6DA4-8211-3F09-7196AABBE564}\LocalServer32 urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32\ = "C:\\Windows\\SysWOW64\\urdvxc.exe" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5DA7E191-3518-8C5E-DAD0-E316016B7509} urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D72C442F-6EA9-BFAF-2703-0F262F8765FD} urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AC84F518-2B78-BCFB-E876-EDAE640549C3} urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EB4470BE-3A35-A218-C7F6-4398C8694892}\LocalServer32 urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32 urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5420C6E-6D8F-5F08-5B45-446692F3C390}\ = "vswswbbwzjejblhh" NEAS.505d95b2631feecee7c33bcd02e415a0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5DA7E191-3518-8C5E-DAD0-E316016B7509}\LocalServer32 urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\ = "wqhhqwzvsktkznle" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D9E5B2A0-6DA4-8211-3F09-7196AABBE564} urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EB4470BE-3A35-A218-C7F6-4398C8694892} urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\ = "bqcwztlsnrecllvt" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84} urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D9E5B2A0-6DA4-8211-3F09-7196AABBE564}\ = "rjshhsksnrsqtvnj" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\ = "nzbekbkcjwbsjsll" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5420C6E-6D8F-5F08-5B45-446692F3C390} NEAS.505d95b2631feecee7c33bcd02e415a0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32 urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\ = "khvhnlbksrkhnntx" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32 urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32\ = "C:\\Windows\\SysWOW64\\urdvxc.exe" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5DA7E191-3518-8C5E-DAD0-E316016B7509}\LocalServer32\ = "C:\\Program Files\\Java\\jdk-1.8\\jre\\revhnlhn.exe" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D72C442F-6EA9-BFAF-2703-0F262F8765FD}\ = "vesbkerchjkscbel" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D72C442F-6EA9-BFAF-2703-0F262F8765FD}\LocalServer32 urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5420C6E-6D8F-5F08-5B45-446692F3C390}\LocalServer32 NEAS.505d95b2631feecee7c33bcd02e415a0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32 urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AC84F518-2B78-BCFB-E876-EDAE640549C3}\LocalServer32 urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AC84F518-2B78-BCFB-E876-EDAE640549C3}\ = "esbttwnnstkbzcst" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EB4470BE-3A35-A218-C7F6-4398C8694892}\LocalServer32\ = "C:\\Program Files\\Microsoft Office\\root\\vfs\\ProgramFilesCommonX64\\Microsoft Shared\\Smart Tag\\1033\\rvhrjtnt.exe" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32\ = "C:\\Windows\\SysWOW64\\urdvxc.exe" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32\ = "C:\\Windows\\SysWOW64\\urdvxc.exe" urdvxc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1064 urdvxc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4212 wrote to memory of 1064 4212 NEAS.505d95b2631feecee7c33bcd02e415a0.exe 91 PID 4212 wrote to memory of 1064 4212 NEAS.505d95b2631feecee7c33bcd02e415a0.exe 91 PID 4212 wrote to memory of 1064 4212 NEAS.505d95b2631feecee7c33bcd02e415a0.exe 91 PID 4212 wrote to memory of 3140 4212 NEAS.505d95b2631feecee7c33bcd02e415a0.exe 92 PID 4212 wrote to memory of 3140 4212 NEAS.505d95b2631feecee7c33bcd02e415a0.exe 92 PID 4212 wrote to memory of 3140 4212 NEAS.505d95b2631feecee7c33bcd02e415a0.exe 92 PID 4212 wrote to memory of 2180 4212 NEAS.505d95b2631feecee7c33bcd02e415a0.exe 94 PID 4212 wrote to memory of 2180 4212 NEAS.505d95b2631feecee7c33bcd02e415a0.exe 94 PID 4212 wrote to memory of 2180 4212 NEAS.505d95b2631feecee7c33bcd02e415a0.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.505d95b2631feecee7c33bcd02e415a0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.505d95b2631feecee7c33bcd02e415a0.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\urdvxc.exeC:\Windows\system32\urdvxc.exe /installservice2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Windows\SysWOW64\urdvxc.exeC:\Windows\system32\urdvxc.exe /start2⤵
- Executes dropped EXE
- Modifies registry class
PID:3140
-
-
C:\Windows\SysWOW64\urdvxc.exeC:\Windows\system32\urdvxc.exe /uninstallservice patch:C:\Users\Admin\AppData\Local\Temp\NEAS.505d95b2631feecee7c33bcd02e415a0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies registry class
PID:2180
-
-
C:\Windows\SysWOW64\urdvxc.exe"C:\Windows\SysWOW64\urdvxc.exe" /service1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
PID:3424
-
C:\Windows\SysWOW64\urdvxc.exe"C:\Windows\SysWOW64\urdvxc.exe" /service1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
PID:1096
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263B
MD58e0789ff750b413c70a9b109432cf0ba
SHA184c429f3b741a44bced2a137ee62254348e89da6
SHA256f37026c18146ffd616868fc2b6b18bd1d4d35d701a99d1eb1e3b0974c01079b1
SHA51236b4cd6cb7854ed594ab3e1918731e2ad76fc3dab376f691518a2fb19fc8d1edd6f512846fbb171123dac0f661444a84c112dad014477fb7f6420dc03700a899
-
Filesize
1KB
MD52fe21944034eb6b2b24f4bed8b1bee2c
SHA1b53bb2babe0c2fe682a2e1c05d79dcf4fedf15a1
SHA2566ffa2002e97816536eb55bef0ba11402fda791a3c4e7fa42f15f64967cdf1e9e
SHA5124ac42b5d64d2f98e652a269a78bc012caf340fe43e7ef97fae58a1437b7360b05b949637c061d1ce818a2ca789c6db09d9c432efbe5dd8f7ee938f81976725eb
-
Filesize
1KB
MD595f69e6e9f61b657cd77e222058b38e1
SHA1985529656adf9f5ccaad017b0e6c58dae052e3f3
SHA256a22037d6fa3155c7d8802069959c3e79cb6e5c789156528a814af3310f4ac7d2
SHA512561a82cf12ec7898334647734cd8c32f1a79ca7627116f1ba7fd7954e7e3099b89dfd1a73829660e714bb926513b811fbf08d356cb1342572b55d7689bd1b35a
-
Filesize
119KB
MD5505d95b2631feecee7c33bcd02e415a0
SHA1fecda142134db51d2ede9c9be0f0f6648515071b
SHA256303a535019df334895e52688b5fad86b12b2a47cb46161aec1f3c7d52f793e79
SHA512710de8619085a7c35483ea66221489f931a54398146835be996cd305705dd21a2577a43682b3941ff354469c0d87e8b01fd969220ae3c0df98cbf6d8eb49f1bc
-
Filesize
119KB
MD5505d95b2631feecee7c33bcd02e415a0
SHA1fecda142134db51d2ede9c9be0f0f6648515071b
SHA256303a535019df334895e52688b5fad86b12b2a47cb46161aec1f3c7d52f793e79
SHA512710de8619085a7c35483ea66221489f931a54398146835be996cd305705dd21a2577a43682b3941ff354469c0d87e8b01fd969220ae3c0df98cbf6d8eb49f1bc
-
Filesize
119KB
MD5505d95b2631feecee7c33bcd02e415a0
SHA1fecda142134db51d2ede9c9be0f0f6648515071b
SHA256303a535019df334895e52688b5fad86b12b2a47cb46161aec1f3c7d52f793e79
SHA512710de8619085a7c35483ea66221489f931a54398146835be996cd305705dd21a2577a43682b3941ff354469c0d87e8b01fd969220ae3c0df98cbf6d8eb49f1bc
-
Filesize
119KB
MD5505d95b2631feecee7c33bcd02e415a0
SHA1fecda142134db51d2ede9c9be0f0f6648515071b
SHA256303a535019df334895e52688b5fad86b12b2a47cb46161aec1f3c7d52f793e79
SHA512710de8619085a7c35483ea66221489f931a54398146835be996cd305705dd21a2577a43682b3941ff354469c0d87e8b01fd969220ae3c0df98cbf6d8eb49f1bc
-
Filesize
119KB
MD5505d95b2631feecee7c33bcd02e415a0
SHA1fecda142134db51d2ede9c9be0f0f6648515071b
SHA256303a535019df334895e52688b5fad86b12b2a47cb46161aec1f3c7d52f793e79
SHA512710de8619085a7c35483ea66221489f931a54398146835be996cd305705dd21a2577a43682b3941ff354469c0d87e8b01fd969220ae3c0df98cbf6d8eb49f1bc
-
Filesize
119KB
MD5505d95b2631feecee7c33bcd02e415a0
SHA1fecda142134db51d2ede9c9be0f0f6648515071b
SHA256303a535019df334895e52688b5fad86b12b2a47cb46161aec1f3c7d52f793e79
SHA512710de8619085a7c35483ea66221489f931a54398146835be996cd305705dd21a2577a43682b3941ff354469c0d87e8b01fd969220ae3c0df98cbf6d8eb49f1bc