Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2023, 09:30
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe
-
Size
135KB
-
MD5
646d4dd177474e2e0001aeb37b789180
-
SHA1
38eae3717aac8b24d94b049b3c30dc675f712e9c
-
SHA256
c647006243803ea3bb11144053adfb3320f7d6c188784ffa2ae07d016794e899
-
SHA512
7b52f07498c62b76ea3c90248bca3a82576f44f6a2cf6e7a6b7d165fc5afb407832fea8fa994a0e479a63db614d47d778068dbc969e06c58e109150cd77f59e9
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVlTM:UVqoCl/YgjxEufVU0TbTyDDalD4
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 3672 explorer.exe 1408 spoolsv.exe 5004 svchost.exe 1096 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe 3672 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3672 explorer.exe 5004 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 3672 explorer.exe 3672 explorer.exe 1408 spoolsv.exe 1408 spoolsv.exe 5004 svchost.exe 5004 svchost.exe 1096 spoolsv.exe 1096 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3964 wrote to memory of 3672 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 87 PID 3964 wrote to memory of 3672 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 87 PID 3964 wrote to memory of 3672 3964 NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe 87 PID 3672 wrote to memory of 1408 3672 explorer.exe 88 PID 3672 wrote to memory of 1408 3672 explorer.exe 88 PID 3672 wrote to memory of 1408 3672 explorer.exe 88 PID 1408 wrote to memory of 5004 1408 spoolsv.exe 90 PID 1408 wrote to memory of 5004 1408 spoolsv.exe 90 PID 1408 wrote to memory of 5004 1408 spoolsv.exe 90 PID 5004 wrote to memory of 1096 5004 svchost.exe 91 PID 5004 wrote to memory of 1096 5004 svchost.exe 91 PID 5004 wrote to memory of 1096 5004 svchost.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3964 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3672 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1408 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5004 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1096
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD50e667da5b06c6b7488fc1c2eaddb0686
SHA16f7aabe77ecffa892e6658320093e30d55ac59ba
SHA2567f0b69d8e47f1243299161275bc031a5ace242c301fdae8f5cf99183d947ce2d
SHA5128cf7b93f375e8339bd9544d4fb7a5877340d955270b38175ea2043d46bdea0677564b12784b3831ca1540b322a3c78c3c800e6b0d579b23fc4ae665b97f0901f
-
Filesize
135KB
MD55243ddef1ae753d43d920ce0afea98eb
SHA12a65f267da997e3eb80e23709cd96000c80933fa
SHA2561e7eda13c9cb09ac9e92a31c61eaa60500aee2d5d1031bab55cedc594162e49e
SHA5129f0e3ae4c1a1c511bd32440f9f70a75ad4c0f7d44e85f097885f2530322135b15651d9b9ce38151211cbe30c2a7bfceec47392ed1542c8611bcea9213f779756
-
Filesize
135KB
MD55243ddef1ae753d43d920ce0afea98eb
SHA12a65f267da997e3eb80e23709cd96000c80933fa
SHA2561e7eda13c9cb09ac9e92a31c61eaa60500aee2d5d1031bab55cedc594162e49e
SHA5129f0e3ae4c1a1c511bd32440f9f70a75ad4c0f7d44e85f097885f2530322135b15651d9b9ce38151211cbe30c2a7bfceec47392ed1542c8611bcea9213f779756
-
Filesize
135KB
MD55243ddef1ae753d43d920ce0afea98eb
SHA12a65f267da997e3eb80e23709cd96000c80933fa
SHA2561e7eda13c9cb09ac9e92a31c61eaa60500aee2d5d1031bab55cedc594162e49e
SHA5129f0e3ae4c1a1c511bd32440f9f70a75ad4c0f7d44e85f097885f2530322135b15651d9b9ce38151211cbe30c2a7bfceec47392ed1542c8611bcea9213f779756
-
Filesize
135KB
MD52ee619f66e481da4b8621c702cc23783
SHA125757a5f99923ff76f6460bbbf4bdc14ce799a6c
SHA25618870ff7e607cca99f5f25ac1d41e0c1cfda98b108b1c3fe08a9f44801213b53
SHA5123e7dabbd222f10a16efa172b4eebbb878ab8727b8fffaedce6204054d6d2ca7afb746ff813b4e32ddbae6fe0f80fd37e9d57209e6d0c3cefead8f7d558b1a448
-
Filesize
135KB
MD55243ddef1ae753d43d920ce0afea98eb
SHA12a65f267da997e3eb80e23709cd96000c80933fa
SHA2561e7eda13c9cb09ac9e92a31c61eaa60500aee2d5d1031bab55cedc594162e49e
SHA5129f0e3ae4c1a1c511bd32440f9f70a75ad4c0f7d44e85f097885f2530322135b15651d9b9ce38151211cbe30c2a7bfceec47392ed1542c8611bcea9213f779756
-
Filesize
135KB
MD52ee619f66e481da4b8621c702cc23783
SHA125757a5f99923ff76f6460bbbf4bdc14ce799a6c
SHA25618870ff7e607cca99f5f25ac1d41e0c1cfda98b108b1c3fe08a9f44801213b53
SHA5123e7dabbd222f10a16efa172b4eebbb878ab8727b8fffaedce6204054d6d2ca7afb746ff813b4e32ddbae6fe0f80fd37e9d57209e6d0c3cefead8f7d558b1a448
-
Filesize
135KB
MD50e667da5b06c6b7488fc1c2eaddb0686
SHA16f7aabe77ecffa892e6658320093e30d55ac59ba
SHA2567f0b69d8e47f1243299161275bc031a5ace242c301fdae8f5cf99183d947ce2d
SHA5128cf7b93f375e8339bd9544d4fb7a5877340d955270b38175ea2043d46bdea0677564b12784b3831ca1540b322a3c78c3c800e6b0d579b23fc4ae665b97f0901f