Analysis
-
max time kernel
167s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2023 15:42
Behavioral task
behavioral1
Sample
NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe
Resource
win7-20231020-en
General
-
Target
NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe
-
Size
219KB
-
MD5
0076f6d2274efcdbb5b9f057a90be010
-
SHA1
ac67cadf8b3cb202da35a7c93444642b600bcbf5
-
SHA256
08f0c7e52112d0154b1263b435f62dd95236763504d2b6fa8614578535750509
-
SHA512
7427e0cb1cb700c4ea0a40a4dfe138727e1ba5965acc3e9b00e722c59b1ecbef2eee639f6d18865bc9a0a4ade733eba6da34312e592e66056bca61276b933b63
-
SSDEEP
6144:MdbC+2kYpjDXkXz+S/dlLe87tjC+rbhjf1:xd0BHr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3724 TrustedInstaller.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3168-0-0x0000000001000000-0x0000000001074000-memory.dmp upx behavioral2/files/0x0007000000022dfe-5.dat upx behavioral2/files/0x0001000000018995-17.dat upx behavioral2/memory/3168-26-0x0000000001000000-0x0000000001074000-memory.dmp upx -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened (read-only) \??\Y: NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened (read-only) \??\J: NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened (read-only) \??\N: NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened (read-only) \??\P: NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened (read-only) \??\S: NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened (read-only) \??\T: NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened (read-only) \??\V: NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened (read-only) \??\Z: NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened (read-only) \??\E: NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened (read-only) \??\I: NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened (read-only) \??\K: NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened (read-only) \??\L: NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened (read-only) \??\O: NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened (read-only) \??\G: NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened (read-only) \??\H: NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened (read-only) \??\Q: NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened (read-only) \??\U: NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened (read-only) \??\W: NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened (read-only) \??\M: NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened (read-only) \??\R: NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe -
Drops file in System32 directory 27 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\dllhost.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File created \??\c:\windows\SysWOW64\msiexec.vir NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\windows\SysWOW64\sgrmbroker.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\windows\SysWOW64\openssh\ssh-agent.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\windows\SysWOW64\diagsvcs\diagnosticshub.standardcollector.service.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\windows\SysWOW64\fxssvc.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\windows\SysWOW64\perceptionsimulation\perceptionsimulationservice.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\windows\SysWOW64\spectrum.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\windows\SysWOW64\Agentservice.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\windows\SysWOW64\vssvc.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\windows\SysWOW64\perfhost.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\windows\SysWOW64\wbengine.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\windows\SysWOW64\sensordataservice.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\windows\SysWOW64\wbem\wmiApsrv.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.vir NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\windows\SysWOW64\msiexec.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\windows\SysWOW64\tieringengineservice.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\windows\SysWOW64\vds.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\windows\SysWOW64\Appvclient.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\windows\SysWOW64\msdtc.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logs\CBS\CBS.log TrustedInstaller.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TrustedInstaller.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3168 NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.0076f6d2274efcdbb5b9f057a90be010_JC.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3168
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
567KB
MD5767e8b6864e12387f09581cf1139bb18
SHA188a2e7d2df4b44270788438c2d5bdc8a8d2d2342
SHA256a983ffb6c458089c76253312de513e930f1d628664c9da0f3e90eca813acf0c6
SHA51256ab41f663a44cf8017a2c2307448c95f1a7dd18a92f4c485dc6b5b2ed362ec1b6f109b99f384d393caa763b8ee61c9c7990e1850de8ee0927f423f0b7252cf3
-
Filesize
202KB
MD57718a23f894448c1b99201e6885843c6
SHA1c8e0e527913c24670a4bef5151360f20685e769b
SHA2569c9f3990a5b9b609cd3849a2d1ca642a5af7a0ed0910e9e2fbfb02ba6eb657cc
SHA51263a65e232bc85c648690493b639483628989c61375218dd225b3be13d1d797f3d450aaddb1cbde8383fd57cf9c33139aa632cd040d16e09f08c61e1076692f6f
-
Filesize
193KB
MD5805418acd5280e97074bdadca4d95195
SHA1a69e4f03d775a7a0cc5ed2d5569cbfbb4d31d2d6
SHA25673684e31ad4afe3fdc525b51ccaacc14d402c92db9c42e3fcbfe1e65524b1c01
SHA512630a255950c0ae0983ae907d20326adea36ce262c7784428a0811b04726849c929bc9cea338a89e77447a6cec30b0889694158327c002566d3cf5be2bb88e4de