Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    05-11-2023 19:16

General

  • Target

    NEAS.8fa39d7820f763186954d16fbc985030.exe

  • Size

    436KB

  • MD5

    8fa39d7820f763186954d16fbc985030

  • SHA1

    41469d3e79dd266b3223d28a255176ec1822c16b

  • SHA256

    48601587bc1c17eec6406176e308311e62d26660f96930c74ef6406919c69800

  • SHA512

    614e02aef34f3e80760ecdd3ef08d4f1c198234f4f1837df77075d85c43df4b8b9d50233a1d10349ce11f52a93e6a5d8376f4e3d4076d2a98cf224f1c0c17b03

  • SSDEEP

    6144:/pW2bgbbV28okoS1oWMkdlZQ5iioct0IwdNOut1V2lgVk:/pW2IoioS6J

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Disables Task Manager via registry modification
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 13 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.8fa39d7820f763186954d16fbc985030.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.8fa39d7820f763186954d16fbc985030.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Windows\System32\reg.exe
      "C:\Windows\System32\reg.exe" ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
      2⤵
      • UAC bypass
      • Modifies registry key
      PID:2988
    • C:\Windows\System32\reg.exe
      "C:\Windows\System32\reg.exe" add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
      2⤵
      • Modifies registry key
      PID:2324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\ZVfDqSGxwhG.exe

    Filesize

    436KB

    MD5

    d1dae2d0376c9b6ebdee837b3c8a87d5

    SHA1

    1eea1db34797aad1fcea553eb92092207df39af6

    SHA256

    cc67119c2fb10109f2691f21edd16f66c951a86ac9c804b1b95a2c0dd56bc931

    SHA512

    7442100fbb38c6c4a4cc7077d52710cf358a7ff8354d8310fdcf14c985efbc8e430f4526e9dff63cebdc3d1da6fd003353e96db4a93071d106e5687532cba054

  • memory/2256-0-0x00000000013C0000-0x00000000013E8000-memory.dmp

    Filesize

    160KB

  • memory/2256-1-0x000007FEF6060000-0x000007FEF6A4C000-memory.dmp

    Filesize

    9.9MB

  • memory/2256-2-0x000000001B1D0000-0x000000001B250000-memory.dmp

    Filesize

    512KB

  • memory/2256-725-0x000007FEF6060000-0x000007FEF6A4C000-memory.dmp

    Filesize

    9.9MB

  • memory/2256-786-0x000000001B1D0000-0x000000001B250000-memory.dmp

    Filesize

    512KB