Analysis
-
max time kernel
128s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2023 14:41
Behavioral task
behavioral1
Sample
NEAS.830769424deb6aa84ef75bc8dcb63e10.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.830769424deb6aa84ef75bc8dcb63e10.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.830769424deb6aa84ef75bc8dcb63e10.exe
-
Size
487KB
-
MD5
830769424deb6aa84ef75bc8dcb63e10
-
SHA1
64c937f287281c65cd13f9c49cd9b98f29641f51
-
SHA256
9c95af3438367b4cbeaa16cce6ed6ff8e407db48de3ab75021b6982867f7a2c3
-
SHA512
f9dba984c9dbae2615e970c48de9f8f6ef3a59f57977b6fe2c2e0e236b57ca88801e0f72eb6a8f69c040bfd41e96f4dd0c6793e6a37f0774fe6f8318ca89be4d
-
SSDEEP
6144:QdspDeDrxkg/vrMuJIgwhEFHyOrJcX/Pgqwzm5IzkWjS4e4azExBKO1t4Kb70NqT:28kxNhOZElO5kkWjhD4AOj5lG
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\System Volume Information\\QDSCZ.EXE \"%1\" %*" NEAS.830769424deb6aa84ef75bc8dcb63e10.exe -
resource yara_rule behavioral2/memory/4360-0-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral2/memory/4360-15-0x0000000000400000-0x0000000000478000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XPW.EXE = "C:\\$Recycle.Bin\\XPW.EXE" NEAS.830769424deb6aa84ef75bc8dcb63e10.exe -
Enumerates connected drives 3 TTPs 17 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\S: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\K: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\L: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\P: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\R: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\T: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\G: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\O: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\Q: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\U: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\E: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\I: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\J: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\M: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\N: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe File opened (read-only) \??\V: NEAS.830769424deb6aa84ef75bc8dcb63e10.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file\shell NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inifile\shell\open\command NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file\shell\open\command NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "C:\\System Volume Information\\QDSCZ.EXE \"%1\"" NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inifile\shell\open\command\ = "C:\\System Volume Information\\QDSCZ.EXE %1" NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\$Recycle.Bin\\JRP.EXE %1" NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\System Volume Information\\QDSCZ.EXE \"%1\"" NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\System Volume Information\\QDSCZ.EXE \"%1\" %*" NEAS.830769424deb6aa84ef75bc8dcb63e10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file\shell\open NEAS.830769424deb6aa84ef75bc8dcb63e10.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.830769424deb6aa84ef75bc8dcb63e10.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.830769424deb6aa84ef75bc8dcb63e10.exe"1⤵
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
PID:4360
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1