Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/11/2023, 23:09

General

  • Target

    NEAS.06fde001e4b67e40e224d14b2ce201a0.exe

  • Size

    234KB

  • MD5

    06fde001e4b67e40e224d14b2ce201a0

  • SHA1

    82b1cc071c1ef46fcfb1b343a736ba8704e1f79b

  • SHA256

    eb7ce5c2e950a16c14008784267affab23cc78a8ba54d1ba2ded5e7dcd0d460b

  • SHA512

    8c5861040c095feac6d38ad850d19ace2f91a568d80bec595a7addbe11ff342b7359d16080a13f11fc8f24704ca2d820eae7f69256b58cc7c0b6fe6ea24b28cf

  • SSDEEP

    3072:O2x43rYHgaKwjl0I9r5rSzaXI8QZXB28JPSdwE2OqfYuN4d0gntUKDkQpo5J8KJK:OR3EVprWu5Qjj8djzqfYFv8QpqLJx

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    PID:3152
    • C:\Users\Admin\AppData\Local\Temp\NEAS.06fde001e4b67e40e224d14b2ce201a0.exe
      "C:\Users\Admin\AppData\Local\Temp\NEAS.06fde001e4b67e40e224d14b2ce201a0.exe"
      2⤵
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:880
      • C:\Users\Admin\AppData\Roaming\boottend\conthelp.exe
        "C:\Users\Admin\AppData\Roaming\boottend"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3792
        • C:\Users\Admin\AppData\Local\Temp\~88A8.tmp
          3152 239624 3792 1
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1040
  • C:\Windows\SysWOW64\odbcPing.exe
    C:\Windows\SysWOW64\odbcPing.exe -s
    1⤵
    • Executes dropped EXE
    PID:5008

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\~88A8.tmp

          Filesize

          8KB

          MD5

          86dc243576cf5c7445451af37631eea9

          SHA1

          99a81c47c4c02f32c0ab456bfa23c306c7a09bf9

          SHA256

          25d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a

          SHA512

          c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4

        • C:\Users\Admin\AppData\Local\Temp\~88A8.tmp

          Filesize

          8KB

          MD5

          86dc243576cf5c7445451af37631eea9

          SHA1

          99a81c47c4c02f32c0ab456bfa23c306c7a09bf9

          SHA256

          25d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a

          SHA512

          c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4

        • C:\Users\Admin\AppData\Roaming\boottend\conthelp.exe

          Filesize

          234KB

          MD5

          352cd008b06ff92759c0674b3acf0961

          SHA1

          9827d2aa8f439dca5c62066ea08728ac086f0a84

          SHA256

          23362d469a31f6ecc0fb38306e8d3c0da0567e0a8500eabdfe241e1aa97bd82f

          SHA512

          8e6d1762c26d2a6b9629bdddaf5a81137a84f2801dc97c60494a73f0940d4f7d7a660303dcdf877ba675a2087f8aaf41ccc433fc75c90e80de271519d81bc155

        • C:\Users\Admin\AppData\Roaming\boottend\conthelp.exe

          Filesize

          234KB

          MD5

          352cd008b06ff92759c0674b3acf0961

          SHA1

          9827d2aa8f439dca5c62066ea08728ac086f0a84

          SHA256

          23362d469a31f6ecc0fb38306e8d3c0da0567e0a8500eabdfe241e1aa97bd82f

          SHA512

          8e6d1762c26d2a6b9629bdddaf5a81137a84f2801dc97c60494a73f0940d4f7d7a660303dcdf877ba675a2087f8aaf41ccc433fc75c90e80de271519d81bc155

        • C:\Windows\SysWOW64\odbcPing.exe

          Filesize

          234KB

          MD5

          352cd008b06ff92759c0674b3acf0961

          SHA1

          9827d2aa8f439dca5c62066ea08728ac086f0a84

          SHA256

          23362d469a31f6ecc0fb38306e8d3c0da0567e0a8500eabdfe241e1aa97bd82f

          SHA512

          8e6d1762c26d2a6b9629bdddaf5a81137a84f2801dc97c60494a73f0940d4f7d7a660303dcdf877ba675a2087f8aaf41ccc433fc75c90e80de271519d81bc155

        • C:\Windows\SysWOW64\odbcPing.exe

          Filesize

          234KB

          MD5

          352cd008b06ff92759c0674b3acf0961

          SHA1

          9827d2aa8f439dca5c62066ea08728ac086f0a84

          SHA256

          23362d469a31f6ecc0fb38306e8d3c0da0567e0a8500eabdfe241e1aa97bd82f

          SHA512

          8e6d1762c26d2a6b9629bdddaf5a81137a84f2801dc97c60494a73f0940d4f7d7a660303dcdf877ba675a2087f8aaf41ccc433fc75c90e80de271519d81bc155

        • memory/880-0-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/880-1-0x0000000000440000-0x0000000000483000-memory.dmp

          Filesize

          268KB

        • memory/880-21-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/3152-54-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-60-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-24-0x0000000000810000-0x0000000000816000-memory.dmp

          Filesize

          24KB

        • memory/3152-97-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-99-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-98-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-96-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-95-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-26-0x0000000002930000-0x000000000293D000-memory.dmp

          Filesize

          52KB

        • memory/3152-29-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-30-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-32-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-31-0x0000000002770000-0x0000000002780000-memory.dmp

          Filesize

          64KB

        • memory/3152-33-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-34-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-35-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-36-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-38-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-37-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-41-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-40-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-42-0x00000000027A0000-0x00000000027B0000-memory.dmp

          Filesize

          64KB

        • memory/3152-44-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-43-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-48-0x0000000002770000-0x0000000002780000-memory.dmp

          Filesize

          64KB

        • memory/3152-47-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-50-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-46-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-52-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-17-0x00000000028E0000-0x000000000292A000-memory.dmp

          Filesize

          296KB

        • memory/3152-45-0x00000000027A0000-0x00000000027B0000-memory.dmp

          Filesize

          64KB

        • memory/3152-55-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-56-0x00000000027A0000-0x00000000027B0000-memory.dmp

          Filesize

          64KB

        • memory/3152-57-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-59-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-20-0x00000000028E0000-0x000000000292A000-memory.dmp

          Filesize

          296KB

        • memory/3152-61-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-63-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-64-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-65-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-66-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-67-0x00000000009D0000-0x00000000009E0000-memory.dmp

          Filesize

          64KB

        • memory/3152-68-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-69-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-70-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-72-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-71-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-74-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-77-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-76-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-78-0x00000000009E0000-0x00000000009F0000-memory.dmp

          Filesize

          64KB

        • memory/3152-79-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-81-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-80-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-83-0x00000000009E0000-0x00000000009F0000-memory.dmp

          Filesize

          64KB

        • memory/3152-86-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-87-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-85-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-82-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-89-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-90-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-91-0x00000000009E0000-0x00000000009F0000-memory.dmp

          Filesize

          64KB

        • memory/3152-92-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-94-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3152-93-0x0000000002760000-0x0000000002770000-memory.dmp

          Filesize

          64KB

        • memory/3792-7-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/3792-18-0x00000000020C0000-0x00000000020C5000-memory.dmp

          Filesize

          20KB

        • memory/3792-8-0x0000000000440000-0x0000000000483000-memory.dmp

          Filesize

          268KB

        • memory/5008-12-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/5008-16-0x0000000000520000-0x0000000000563000-memory.dmp

          Filesize

          268KB