Analysis
-
max time kernel
137s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2023, 19:27
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0367166723e9814aee0c5017390fcc10.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.0367166723e9814aee0c5017390fcc10.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.0367166723e9814aee0c5017390fcc10.exe
-
Size
176KB
-
MD5
0367166723e9814aee0c5017390fcc10
-
SHA1
82a91a9069b15c53e499672d3a386cdb9ecd2201
-
SHA256
c8bffcd558eafde9dddfbde9563934e4c8c908dca9aebf60ee11a5601c27c665
-
SHA512
e33a955f776eb76b61d8b9beca8691868a46c915c737e93410a557330cb0fa957554bed55391813cd4f71014b3586d741219315d33bc5cba00ca96be5de87867
-
SSDEEP
3072:DJ7QpeDX4leI73Hofa6A7AUyf4wDso3EBIP6Mx39SdodwDU8zxK:xoleI73HWa7A7Dp3hrxtQodi5zx
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\chrome = "C:\\Users\\Admin\\AppData\\Roaming\\google \\chrome.exe" NEAS.0367166723e9814aee0c5017390fcc10.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Windows\assembly\Desktop.ini NEAS.0367166723e9814aee0c5017390fcc10.exe File created C:\Windows\assembly\Desktop.ini NEAS.0367166723e9814aee0c5017390fcc10.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly\Desktop.ini NEAS.0367166723e9814aee0c5017390fcc10.exe File opened for modification C:\Windows\assembly NEAS.0367166723e9814aee0c5017390fcc10.exe File created C:\Windows\assembly\Desktop.ini NEAS.0367166723e9814aee0c5017390fcc10.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3544 NEAS.0367166723e9814aee0c5017390fcc10.exe Token: SeRestorePrivilege 4688 dw20.exe Token: SeBackupPrivilege 4688 dw20.exe Token: SeBackupPrivilege 4688 dw20.exe Token: SeBackupPrivilege 4688 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3544 wrote to memory of 4688 3544 NEAS.0367166723e9814aee0c5017390fcc10.exe 89 PID 3544 wrote to memory of 4688 3544 NEAS.0367166723e9814aee0c5017390fcc10.exe 89 PID 3544 wrote to memory of 4688 3544 NEAS.0367166723e9814aee0c5017390fcc10.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.0367166723e9814aee0c5017390fcc10.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.0367166723e9814aee0c5017390fcc10.exe"1⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 10722⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4688
-