Analysis

  • max time kernel
    151s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/11/2023, 09:30

General

  • Target

    NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe

  • Size

    135KB

  • MD5

    646d4dd177474e2e0001aeb37b789180

  • SHA1

    38eae3717aac8b24d94b049b3c30dc675f712e9c

  • SHA256

    c647006243803ea3bb11144053adfb3320f7d6c188784ffa2ae07d016794e899

  • SHA512

    7b52f07498c62b76ea3c90248bca3a82576f44f6a2cf6e7a6b7d165fc5afb407832fea8fa994a0e479a63db614d47d778068dbc969e06c58e109150cd77f59e9

  • SSDEEP

    1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVlTM:UVqoCl/YgjxEufVU0TbTyDDalD4

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.646d4dd177474e2e0001aeb37b789180_JC.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3964
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3672
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1408
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:5004
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    0e667da5b06c6b7488fc1c2eaddb0686

    SHA1

    6f7aabe77ecffa892e6658320093e30d55ac59ba

    SHA256

    7f0b69d8e47f1243299161275bc031a5ace242c301fdae8f5cf99183d947ce2d

    SHA512

    8cf7b93f375e8339bd9544d4fb7a5877340d955270b38175ea2043d46bdea0677564b12784b3831ca1540b322a3c78c3c800e6b0d579b23fc4ae665b97f0901f

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    5243ddef1ae753d43d920ce0afea98eb

    SHA1

    2a65f267da997e3eb80e23709cd96000c80933fa

    SHA256

    1e7eda13c9cb09ac9e92a31c61eaa60500aee2d5d1031bab55cedc594162e49e

    SHA512

    9f0e3ae4c1a1c511bd32440f9f70a75ad4c0f7d44e85f097885f2530322135b15651d9b9ce38151211cbe30c2a7bfceec47392ed1542c8611bcea9213f779756

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    5243ddef1ae753d43d920ce0afea98eb

    SHA1

    2a65f267da997e3eb80e23709cd96000c80933fa

    SHA256

    1e7eda13c9cb09ac9e92a31c61eaa60500aee2d5d1031bab55cedc594162e49e

    SHA512

    9f0e3ae4c1a1c511bd32440f9f70a75ad4c0f7d44e85f097885f2530322135b15651d9b9ce38151211cbe30c2a7bfceec47392ed1542c8611bcea9213f779756

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    5243ddef1ae753d43d920ce0afea98eb

    SHA1

    2a65f267da997e3eb80e23709cd96000c80933fa

    SHA256

    1e7eda13c9cb09ac9e92a31c61eaa60500aee2d5d1031bab55cedc594162e49e

    SHA512

    9f0e3ae4c1a1c511bd32440f9f70a75ad4c0f7d44e85f097885f2530322135b15651d9b9ce38151211cbe30c2a7bfceec47392ed1542c8611bcea9213f779756

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    2ee619f66e481da4b8621c702cc23783

    SHA1

    25757a5f99923ff76f6460bbbf4bdc14ce799a6c

    SHA256

    18870ff7e607cca99f5f25ac1d41e0c1cfda98b108b1c3fe08a9f44801213b53

    SHA512

    3e7dabbd222f10a16efa172b4eebbb878ab8727b8fffaedce6204054d6d2ca7afb746ff813b4e32ddbae6fe0f80fd37e9d57209e6d0c3cefead8f7d558b1a448

  • \??\c:\windows\resources\spoolsv.exe

    Filesize

    135KB

    MD5

    5243ddef1ae753d43d920ce0afea98eb

    SHA1

    2a65f267da997e3eb80e23709cd96000c80933fa

    SHA256

    1e7eda13c9cb09ac9e92a31c61eaa60500aee2d5d1031bab55cedc594162e49e

    SHA512

    9f0e3ae4c1a1c511bd32440f9f70a75ad4c0f7d44e85f097885f2530322135b15651d9b9ce38151211cbe30c2a7bfceec47392ed1542c8611bcea9213f779756

  • \??\c:\windows\resources\svchost.exe

    Filesize

    135KB

    MD5

    2ee619f66e481da4b8621c702cc23783

    SHA1

    25757a5f99923ff76f6460bbbf4bdc14ce799a6c

    SHA256

    18870ff7e607cca99f5f25ac1d41e0c1cfda98b108b1c3fe08a9f44801213b53

    SHA512

    3e7dabbd222f10a16efa172b4eebbb878ab8727b8fffaedce6204054d6d2ca7afb746ff813b4e32ddbae6fe0f80fd37e9d57209e6d0c3cefead8f7d558b1a448

  • \??\c:\windows\resources\themes\explorer.exe

    Filesize

    135KB

    MD5

    0e667da5b06c6b7488fc1c2eaddb0686

    SHA1

    6f7aabe77ecffa892e6658320093e30d55ac59ba

    SHA256

    7f0b69d8e47f1243299161275bc031a5ace242c301fdae8f5cf99183d947ce2d

    SHA512

    8cf7b93f375e8339bd9544d4fb7a5877340d955270b38175ea2043d46bdea0677564b12784b3831ca1540b322a3c78c3c800e6b0d579b23fc4ae665b97f0901f

  • memory/1096-32-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1408-33-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3672-35-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3964-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3964-34-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/5004-36-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB