Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
04-11-2023 09:34
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.01b94eaa99f2e998d7cb882ce673f620_JC.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.01b94eaa99f2e998d7cb882ce673f620_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.01b94eaa99f2e998d7cb882ce673f620_JC.exe
-
Size
216KB
-
MD5
01b94eaa99f2e998d7cb882ce673f620
-
SHA1
5e3a8514ae4ac4232c48f5ce24891cdd96a3133d
-
SHA256
8c407c42ab90e8ccffd55b917c9b7bae3210de515519ded70f1d7df3fe6784db
-
SHA512
69f1457a6919a7496c95fdee93b5061e2fb85a1a5f730041bf51a04f6db00409381230a86ee0cbfc1c36352717e50198ae8aa994970f2857b5f9f16f756f132d
-
SSDEEP
6144:pDn0J/fNQ4bc3wT994Th6rC2dzT/Y7BNandXg:hefN3o3wT994Th6rC2dI7radQ
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "2" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "2" svchost.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2924 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1916 NEAS.01b94eaa99f2e998d7cb882ce673f620_JC.exe 1916 NEAS.01b94eaa99f2e998d7cb882ce673f620_JC.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMax = "C:\\Users\\Admin\\userinit.exe" svchost.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\Y: svchost.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\Autorun.inf svchost.exe File opened for modification C:\Autorun.inf svchost.exe File created F:\Autorun.inf svchost.exe File opened for modification F:\Autorun.inf svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Microsoft Shared\MSshare.exe svchost.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\MSshare.exe svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Web\OfficeUpdate.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2924 1916 NEAS.01b94eaa99f2e998d7cb882ce673f620_JC.exe 28 PID 1916 wrote to memory of 2924 1916 NEAS.01b94eaa99f2e998d7cb882ce673f620_JC.exe 28 PID 1916 wrote to memory of 2924 1916 NEAS.01b94eaa99f2e998d7cb882ce673f620_JC.exe 28 PID 1916 wrote to memory of 2924 1916 NEAS.01b94eaa99f2e998d7cb882ce673f620_JC.exe 28 PID 2924 wrote to memory of 2692 2924 svchost.exe 29 PID 2924 wrote to memory of 2692 2924 svchost.exe 29 PID 2924 wrote to memory of 2692 2924 svchost.exe 29 PID 2924 wrote to memory of 2692 2924 svchost.exe 29 PID 2924 wrote to memory of 2604 2924 svchost.exe 31 PID 2924 wrote to memory of 2604 2924 svchost.exe 31 PID 2924 wrote to memory of 2604 2924 svchost.exe 31 PID 2924 wrote to memory of 2604 2924 svchost.exe 31 PID 2924 wrote to memory of 1240 2924 svchost.exe 33 PID 2924 wrote to memory of 1240 2924 svchost.exe 33 PID 2924 wrote to memory of 1240 2924 svchost.exe 33 PID 2924 wrote to memory of 1240 2924 svchost.exe 33 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Nofolderoptions = "1" svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.01b94eaa99f2e998d7cb882ce673f620_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.01b94eaa99f2e998d7cb882ce673f620_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2924 -
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe" /delete /yes3⤵PID:2692
-
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe" 20:30 /every:M,T,W,TH,F,S,SU C:\Windows\Web\OfficeUpdate.exe3⤵PID:2604
-
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe" 11:30 /every:M,T,W,TH,F,S,SU C:\Windows\Web\OfficeUpdate.exe3⤵PID:1240
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD501b94eaa99f2e998d7cb882ce673f620
SHA15e3a8514ae4ac4232c48f5ce24891cdd96a3133d
SHA2568c407c42ab90e8ccffd55b917c9b7bae3210de515519ded70f1d7df3fe6784db
SHA51269f1457a6919a7496c95fdee93b5061e2fb85a1a5f730041bf51a04f6db00409381230a86ee0cbfc1c36352717e50198ae8aa994970f2857b5f9f16f756f132d
-
Filesize
216KB
MD501b94eaa99f2e998d7cb882ce673f620
SHA15e3a8514ae4ac4232c48f5ce24891cdd96a3133d
SHA2568c407c42ab90e8ccffd55b917c9b7bae3210de515519ded70f1d7df3fe6784db
SHA51269f1457a6919a7496c95fdee93b5061e2fb85a1a5f730041bf51a04f6db00409381230a86ee0cbfc1c36352717e50198ae8aa994970f2857b5f9f16f756f132d
-
Filesize
216KB
MD501b94eaa99f2e998d7cb882ce673f620
SHA15e3a8514ae4ac4232c48f5ce24891cdd96a3133d
SHA2568c407c42ab90e8ccffd55b917c9b7bae3210de515519ded70f1d7df3fe6784db
SHA51269f1457a6919a7496c95fdee93b5061e2fb85a1a5f730041bf51a04f6db00409381230a86ee0cbfc1c36352717e50198ae8aa994970f2857b5f9f16f756f132d
-
Filesize
216KB
MD501b94eaa99f2e998d7cb882ce673f620
SHA15e3a8514ae4ac4232c48f5ce24891cdd96a3133d
SHA2568c407c42ab90e8ccffd55b917c9b7bae3210de515519ded70f1d7df3fe6784db
SHA51269f1457a6919a7496c95fdee93b5061e2fb85a1a5f730041bf51a04f6db00409381230a86ee0cbfc1c36352717e50198ae8aa994970f2857b5f9f16f756f132d
-
Filesize
216KB
MD501b94eaa99f2e998d7cb882ce673f620
SHA15e3a8514ae4ac4232c48f5ce24891cdd96a3133d
SHA2568c407c42ab90e8ccffd55b917c9b7bae3210de515519ded70f1d7df3fe6784db
SHA51269f1457a6919a7496c95fdee93b5061e2fb85a1a5f730041bf51a04f6db00409381230a86ee0cbfc1c36352717e50198ae8aa994970f2857b5f9f16f756f132d