Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
04-11-2023 14:41
Behavioral task
behavioral1
Sample
NEAS.830769424deb6aa84ef75bc8dcb63e10.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.830769424deb6aa84ef75bc8dcb63e10.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.830769424deb6aa84ef75bc8dcb63e10.exe
-
Size
487KB
-
MD5
830769424deb6aa84ef75bc8dcb63e10
-
SHA1
64c937f287281c65cd13f9c49cd9b98f29641f51
-
SHA256
9c95af3438367b4cbeaa16cce6ed6ff8e407db48de3ab75021b6982867f7a2c3
-
SHA512
f9dba984c9dbae2615e970c48de9f8f6ef3a59f57977b6fe2c2e0e236b57ca88801e0f72eb6a8f69c040bfd41e96f4dd0c6793e6a37f0774fe6f8318ca89be4d
-
SSDEEP
6144:QdspDeDrxkg/vrMuJIgwhEFHyOrJcX/Pgqwzm5IzkWjS4e4azExBKO1t4Kb70NqT:28kxNhOZElO5kkWjhD4AOj5lG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2724 FILV.EXE -
Loads dropped DLL 2 IoCs
pid Process 2108 NEAS.830769424deb6aa84ef75bc8dcb63e10.exe 2108 NEAS.830769424deb6aa84ef75bc8dcb63e10.exe -
Modifies system executable filetype association 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command FILV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\NVRQSOO.EXE \"%1\" %*" NEAS.830769424deb6aa84ef75bc8dcb63e10.exe -
resource yara_rule behavioral1/memory/2108-0-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/files/0x0008000000014b59-10.dat upx behavioral1/files/0x0009000000012024-20.dat upx behavioral1/files/0x0009000000012024-27.dat upx behavioral1/files/0x0009000000012024-22.dat upx behavioral1/memory/2108-30-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/2724-29-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/2724-33-0x0000000000400000-0x0000000000478000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\UHUA.EXE = "C:\\Windows\\NVRQSOO.EXE" NEAS.830769424deb6aa84ef75bc8dcb63e10.exe -
Enumerates connected drives 3 TTPs 17 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\O: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\R: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\U: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\I: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\K: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\N: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\Q: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\H: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\L: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\T: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\V: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\S: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\E: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\J: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\M: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\P: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\FILV.EXE NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File created C:\Program Files (x86)\EJWFT.EXE NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File created C:\Program Files\BSPRZ.EXE NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened for modification C:\Program Files\BSPRZ.EXE NEAS.830769424deb6aa84ef75bc8dcb63e10.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\NVRQSOO.EXE NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened for modification C:\Windows\NVRQSOO.EXE NEAS.830769424deb6aa84ef75bc8dcb63e10.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file\shell\open NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inifile\shell\open\command NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file\shell NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command FILV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file\shell\open\command NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "C:\\Windows\\NVRQSOO.EXE \"%1\"" NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inifile\shell\open\command\ = "C:\\Windows\\NVRQSOO.EXE %1" NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\NVRQSOO.EXE \"%1\" %*" NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Program Files\\BSPRZ.EXE %1" NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\Windows\\NVRQSOO.EXE \"%1\"" NEAS.830769424deb6aa84ef75bc8dcb63e10.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2724 FILV.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2724 2108 NEAS.830769424deb6aa84ef75bc8dcb63e10.exe 28 PID 2108 wrote to memory of 2724 2108 NEAS.830769424deb6aa84ef75bc8dcb63e10.exe 28 PID 2108 wrote to memory of 2724 2108 NEAS.830769424deb6aa84ef75bc8dcb63e10.exe 28 PID 2108 wrote to memory of 2724 2108 NEAS.830769424deb6aa84ef75bc8dcb63e10.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.830769424deb6aa84ef75bc8dcb63e10.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.830769424deb6aa84ef75bc8dcb63e10.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files\FILV.EXE"C:\Program Files\FILV.EXE"2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
487KB
MD51eb200cc069650ca13f15128b648b0fa
SHA1fcc5891adb26b28f4f3cb0bc887aed1cf7acd830
SHA256bc066f1fd34782edbc94f24cdc2436e7ae3b8193f32eb7ffed2e3e84b89ab370
SHA5121cd7377cf55b574314579eee9c6809568091b7a0d5283c117e80fc8bd3c3f9e15e3affd734ea99569f62a6b5f2dfcf58f3629afb869cf8368ee65529b212d368
-
Filesize
487KB
MD56cf09a0bfa53de2f658d9a2ca0ea0334
SHA1471e261314b97bdb5f42f000430cd2b85517c27a
SHA256f0f6ab64ae7806162875ac5a9bb6eaee38d72cbe06e917b96c491d577726ca69
SHA512321200ea46bc930ba8426ded5f4bc8269ddf132205149c3611acecab378a03dde6a01ebd2084afc6724b1b1bd96de3ef4ef87219ff43b7c451a82b122ff514d7
-
Filesize
487KB
MD51eb200cc069650ca13f15128b648b0fa
SHA1fcc5891adb26b28f4f3cb0bc887aed1cf7acd830
SHA256bc066f1fd34782edbc94f24cdc2436e7ae3b8193f32eb7ffed2e3e84b89ab370
SHA5121cd7377cf55b574314579eee9c6809568091b7a0d5283c117e80fc8bd3c3f9e15e3affd734ea99569f62a6b5f2dfcf58f3629afb869cf8368ee65529b212d368
-
Filesize
487KB
MD51eb200cc069650ca13f15128b648b0fa
SHA1fcc5891adb26b28f4f3cb0bc887aed1cf7acd830
SHA256bc066f1fd34782edbc94f24cdc2436e7ae3b8193f32eb7ffed2e3e84b89ab370
SHA5121cd7377cf55b574314579eee9c6809568091b7a0d5283c117e80fc8bd3c3f9e15e3affd734ea99569f62a6b5f2dfcf58f3629afb869cf8368ee65529b212d368