Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
03/11/2023, 20:54
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.893e7a46262f9cf0dae3ff1ed592b530_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.893e7a46262f9cf0dae3ff1ed592b530_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.893e7a46262f9cf0dae3ff1ed592b530_JC.exe
-
Size
211KB
-
MD5
893e7a46262f9cf0dae3ff1ed592b530
-
SHA1
3779cfde6bd05cdde6ba999c0bb31816be43a689
-
SHA256
6a45ebc74ce0884b088015f7a02835d3bdbb6e35d5d81bf3a65b143e92972cf9
-
SHA512
82717664ee2d4f5d3d89a52f05d4ca4d0a7f0cee72e0a057f5171fc97a9d65d19a6ac965eef9f11b30905fe333264f23689471f4080b9561b06de20d963fe51f
-
SSDEEP
3072:JD6Xtx68yygRBE52mxkEOHLRMpZ4deth8PEAjAfIbAYGPhz6sPJBInxZqOY:Jh8cBzHLRMpZ4d1ZY
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" swchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" userinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" swchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" userinit.exe -
Executes dropped EXE 4 IoCs
pid Process 2840 userinit.exe 3068 spoolsw.exe 2608 swchost.exe 2564 spoolsw.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" swchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\system\udsys.exe userinit.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\userinit.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe swchost.exe File opened for modification \??\c:\windows\userinit.exe NEAS.893e7a46262f9cf0dae3ff1ed592b530_JC.exe File opened for modification \??\c:\windows\spoolsw.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe spoolsw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3036 NEAS.893e7a46262f9cf0dae3ff1ed592b530_JC.exe 2840 userinit.exe 2840 userinit.exe 2608 swchost.exe 2840 userinit.exe 2608 swchost.exe 2840 userinit.exe 2608 swchost.exe 2608 swchost.exe 2840 userinit.exe 2608 swchost.exe 2840 userinit.exe 2608 swchost.exe 2840 userinit.exe 2840 userinit.exe 2608 swchost.exe 2840 userinit.exe 2608 swchost.exe 2840 userinit.exe 2608 swchost.exe 2840 userinit.exe 2608 swchost.exe 2840 userinit.exe 2608 swchost.exe 2608 swchost.exe 2840 userinit.exe 2840 userinit.exe 2608 swchost.exe 2608 swchost.exe 2840 userinit.exe 2608 swchost.exe 2840 userinit.exe 2608 swchost.exe 2840 userinit.exe 2608 swchost.exe 2840 userinit.exe 2608 swchost.exe 2840 userinit.exe 2608 swchost.exe 2840 userinit.exe 2608 swchost.exe 2840 userinit.exe 2608 swchost.exe 2840 userinit.exe 2608 swchost.exe 2840 userinit.exe 2608 swchost.exe 2840 userinit.exe 2608 swchost.exe 2840 userinit.exe 2840 userinit.exe 2608 swchost.exe 2608 swchost.exe 2840 userinit.exe 2608 swchost.exe 2840 userinit.exe 2608 swchost.exe 2840 userinit.exe 2608 swchost.exe 2840 userinit.exe 2608 swchost.exe 2840 userinit.exe 2840 userinit.exe 2608 swchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2608 swchost.exe 2840 userinit.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3036 NEAS.893e7a46262f9cf0dae3ff1ed592b530_JC.exe 3036 NEAS.893e7a46262f9cf0dae3ff1ed592b530_JC.exe 2840 userinit.exe 2840 userinit.exe 3068 spoolsw.exe 3068 spoolsw.exe 2608 swchost.exe 2608 swchost.exe 2564 spoolsw.exe 2564 spoolsw.exe 2840 userinit.exe 2840 userinit.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2840 3036 NEAS.893e7a46262f9cf0dae3ff1ed592b530_JC.exe 29 PID 3036 wrote to memory of 2840 3036 NEAS.893e7a46262f9cf0dae3ff1ed592b530_JC.exe 29 PID 3036 wrote to memory of 2840 3036 NEAS.893e7a46262f9cf0dae3ff1ed592b530_JC.exe 29 PID 3036 wrote to memory of 2840 3036 NEAS.893e7a46262f9cf0dae3ff1ed592b530_JC.exe 29 PID 2840 wrote to memory of 3068 2840 userinit.exe 30 PID 2840 wrote to memory of 3068 2840 userinit.exe 30 PID 2840 wrote to memory of 3068 2840 userinit.exe 30 PID 2840 wrote to memory of 3068 2840 userinit.exe 30 PID 3068 wrote to memory of 2608 3068 spoolsw.exe 31 PID 3068 wrote to memory of 2608 3068 spoolsw.exe 31 PID 3068 wrote to memory of 2608 3068 spoolsw.exe 31 PID 3068 wrote to memory of 2608 3068 spoolsw.exe 31 PID 2608 wrote to memory of 2564 2608 swchost.exe 32 PID 2608 wrote to memory of 2564 2608 swchost.exe 32 PID 2608 wrote to memory of 2564 2608 swchost.exe 32 PID 2608 wrote to memory of 2564 2608 swchost.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.893e7a46262f9cf0dae3ff1ed592b530_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.893e7a46262f9cf0dae3ff1ed592b530_JC.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
\??\c:\windows\userinit.exec:\windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
\??\c:\windows\swchost.exec:\windows\swchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2564
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD58b12450b9b91f36fb3d362e420bf8677
SHA1bd7eb07291b8d71e2edbe6749c52d5c180034354
SHA2566f03420b87aba608dd77e2d0ab0613b93ae13689c2d860bb8bd91bee8862c17e
SHA51224c3a4d46ff98ebe7b417c43e721f5a73697f52d05d6009fe849e26fb52969ad1f22b1ee82a1a66b282ca30f0c24c6e0bf1fa19b616c2282cfc2257206ee665d
-
Filesize
211KB
MD56ac051a3c6c33df3a1f8e6f372a252af
SHA10d37f56ac74767310bd1c45564f2ffd1c267a644
SHA25626a2cf50a7571799a9378001198a84e36a2858b20fbf03e06aa7ae6acb20100b
SHA5128ef8223d7221a00e3f06ba562bc3ec5cf8a0ac5059eba82595d0fa5219dbb402515d8a64af80790330a5f4780a0f46017c45af7362f73b70ffe49a11004c970d
-
Filesize
211KB
MD56ac051a3c6c33df3a1f8e6f372a252af
SHA10d37f56ac74767310bd1c45564f2ffd1c267a644
SHA25626a2cf50a7571799a9378001198a84e36a2858b20fbf03e06aa7ae6acb20100b
SHA5128ef8223d7221a00e3f06ba562bc3ec5cf8a0ac5059eba82595d0fa5219dbb402515d8a64af80790330a5f4780a0f46017c45af7362f73b70ffe49a11004c970d
-
Filesize
211KB
MD52ebc3448dbe897dd2315faf9ebcbbb7a
SHA128d1e9a0ca054db5fed7acdbfa18bd885ea266c9
SHA25603ff8a1e342d7e9e418e8a8f93e1754bd8258cd690f14624bb3f8d55c08b0baa
SHA51205f897b8f3aa4c05ed0eb6afff060c65901d7715fe15d802c84b19927aaf0fea1ddeb1208c28496b0b65f1d66a0af0cd79d592f0d56c1cb49bf4063697ea5ae4
-
Filesize
211KB
MD5c65103524967009916f2dd277c2f6730
SHA192d4da2e38f83c739f28bd6cb50a18ac1aac8f31
SHA256065b175a049369e81e9313d0843d871f7904a0026b2cef49eab1ee8660e734ea
SHA51232774f07deed03fa60386667acb198fbc746ad9bb418481c6d2b214e18f633ffc76add1ce05828bc306b90d988a36ad1b208d168a30c2c268fcf9efaee5b0b15
-
Filesize
211KB
MD5c65103524967009916f2dd277c2f6730
SHA192d4da2e38f83c739f28bd6cb50a18ac1aac8f31
SHA256065b175a049369e81e9313d0843d871f7904a0026b2cef49eab1ee8660e734ea
SHA51232774f07deed03fa60386667acb198fbc746ad9bb418481c6d2b214e18f633ffc76add1ce05828bc306b90d988a36ad1b208d168a30c2c268fcf9efaee5b0b15
-
Filesize
211KB
MD56ac051a3c6c33df3a1f8e6f372a252af
SHA10d37f56ac74767310bd1c45564f2ffd1c267a644
SHA25626a2cf50a7571799a9378001198a84e36a2858b20fbf03e06aa7ae6acb20100b
SHA5128ef8223d7221a00e3f06ba562bc3ec5cf8a0ac5059eba82595d0fa5219dbb402515d8a64af80790330a5f4780a0f46017c45af7362f73b70ffe49a11004c970d
-
Filesize
211KB
MD52ebc3448dbe897dd2315faf9ebcbbb7a
SHA128d1e9a0ca054db5fed7acdbfa18bd885ea266c9
SHA25603ff8a1e342d7e9e418e8a8f93e1754bd8258cd690f14624bb3f8d55c08b0baa
SHA51205f897b8f3aa4c05ed0eb6afff060c65901d7715fe15d802c84b19927aaf0fea1ddeb1208c28496b0b65f1d66a0af0cd79d592f0d56c1cb49bf4063697ea5ae4
-
Filesize
211KB
MD5c65103524967009916f2dd277c2f6730
SHA192d4da2e38f83c739f28bd6cb50a18ac1aac8f31
SHA256065b175a049369e81e9313d0843d871f7904a0026b2cef49eab1ee8660e734ea
SHA51232774f07deed03fa60386667acb198fbc746ad9bb418481c6d2b214e18f633ffc76add1ce05828bc306b90d988a36ad1b208d168a30c2c268fcf9efaee5b0b15