Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
05/11/2023, 20:10
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe
-
Size
200KB
-
MD5
e5bc5da50b5fb2dcbb51656a8343aaa0
-
SHA1
e3a4691ec64b9edea5cc9ff77399c9672fbc8ce8
-
SHA256
9d55e8ed3273bce75776e66db1586f8ad8b2e210a2678626b5338187d5e01dbf
-
SHA512
bb3c57a48d96007829bb0366661168763c292c018a05cdbcafc0e6c579ad59e8b370c550bdc5ed3c2f4f65b333122bc7fdf1570973407c794332d7b0078744df
-
SSDEEP
6144:WuaH/U5fqVM4kqgQoBO+Yandhnz2SN1EAPbI:W5H/mJqgrBO+YaXCSAub
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\29062805.sys NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe File created C:\Windows\SysWOW64\drivers\55ad1d83.sys NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\55ad1d83\ImagePath = "\\??\\C:\\Windows\\system32\\drivers\\55ad1d83.sys" NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\29062805\ImagePath = "\\??\\C:\\Windows\\system32\\drivers\\29062805.sys" NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe -
Loads dropped DLL 1 IoCs
pid Process 2120 regsvr32.exe -
resource yara_rule behavioral1/memory/2292-0-0x0000000000290000-0x0000000000310000-memory.dmp upx behavioral1/memory/2292-3-0x0000000000290000-0x0000000000310000-memory.dmp upx behavioral1/memory/2292-4-0x0000000000290000-0x0000000000310000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 6 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{757A1AA2-FF86-47D8-85BF-4D899A822467} regsvr32.exe -
Maps connected drives based on registry 3 TTPs 3 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\midimap.dll NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe File opened for modification C:\Windows\SysWOW64\kakune.dll NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe File created C:\Windows\SysWOW64\kakune.dll NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe File created C:\Windows\SysWOW64\wshtcpne.dll NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe File opened for modification C:\Windows\SysWOW64\wshtcpne.dll NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe File created C:\Windows\SysWOW64\wshtcpip.dll NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe -
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{757A1AA2-FF86-47D8-85BF-4D899A822467}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{757A1AA2-FF86-47D8-85BF-4D899A822467}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{757A1AA8-FF86-47D8-85BF-4D899A822467}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\kakune.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{757A1AA1-FF86-47D8-85BF-4D899A822467}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{757A1AA2-FF86-47D8-85BF-4D899A822467}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{757A1AA8-FF86-47D8-85BF-4D899A822467}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{757A1AA8-FF86-47D8-85BF-4D899A822467}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{757A1AA1-FF86-47D8-85BF-4D899A822467}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{757A1AA1-FF86-47D8-85BF-4D899A822467}\ = "IIEHlprObj" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{757A1AA2-FF86-47D8-85BF-4D899A822467}\ProgID\ = "IEHlprObj.IEHlprObj.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{757A1AA2-FF86-47D8-85BF-4D899A822467}\VersionIndependentProgID\ = "IEHlprObj.IEHlprObj" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{757A1AA8-FF86-47D8-85BF-4D899A822467}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\SYS_DLL NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1\ = "IEHlprObj Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj\ = "IEHlprObj Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj\CurVer\ = "IEHlprObj.IEHlprObj.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{757A1AA2-FF86-47D8-85BF-4D899A822467} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{757A1AA2-FF86-47D8-85BF-4D899A822467}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{757A1AA8-FF86-47D8-85BF-4D899A822467}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{757A1AA1-FF86-47D8-85BF-4D899A822467}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{757A1AA1-FF86-47D8-85BF-4D899A822467}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{757A1AA1-FF86-47D8-85BF-4D899A822467}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{757A1AA8-FF86-47D8-85BF-4D899A822467}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{757A1AA2-FF86-47D8-85BF-4D899A822467}\InprocServer32\ = "C:\\Windows\\SysWow64\\kakune.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{757A1AA8-FF86-47D8-85BF-4D899A822467}\1.0\ = "IEHelper 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{757A1AA1-FF86-47D8-85BF-4D899A822467}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\HOOK_ID NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{757A1AA2-FF86-47D8-85BF-4D899A822467}\ = "IEHlprObj Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{757A1AA1-FF86-47D8-85BF-4D899A822467} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{757A1AA1-FF86-47D8-85BF-4D899A822467}\ = "IIEHlprObj" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{757A1AA1-FF86-47D8-85BF-4D899A822467}\TypeLib\ = "{757A1AA8-FF86-47D8-85BF-4D899A822467}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{757A1AA1-FF86-47D8-85BF-4D899A822467} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1\CLSID\ = "{757A1AA2-FF86-47D8-85BF-4D899A822467}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{757A1AA1-FF86-47D8-85BF-4D899A822467}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{757A1AA8-FF86-47D8-85BF-4D899A822467}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{757A1AA1-FF86-47D8-85BF-4D899A822467}\TypeLib\ = "{757A1AA8-FF86-47D8-85BF-4D899A822467}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{757A1AA8-FF86-47D8-85BF-4D899A822467} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\SYS_DLL\name = "7HhDwP.dll" NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{757A1AA2-FF86-47D8-85BF-4D899A822467}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{757A1AA8-FF86-47D8-85BF-4D899A822467}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{757A1AA1-FF86-47D8-85BF-4D899A822467}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\HOOK_ID\name = "NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe" NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2120 regsvr32.exe 2120 regsvr32.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe -
Suspicious behavior: LoadsDriver 5 IoCs
pid Process 468 Process not Found 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 468 Process not Found 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2120 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 28 PID 2292 wrote to memory of 2120 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 28 PID 2292 wrote to memory of 2120 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 28 PID 2292 wrote to memory of 2120 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 28 PID 2292 wrote to memory of 2120 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 28 PID 2292 wrote to memory of 2120 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 28 PID 2292 wrote to memory of 2120 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 28 PID 2292 wrote to memory of 2688 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 29 PID 2292 wrote to memory of 2688 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 29 PID 2292 wrote to memory of 2688 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 29 PID 2292 wrote to memory of 2688 2292 NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e5bc5da50b5fb2dcbb51656a8343aaa0.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Installs/modifies Browser Helper Object
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s /c C:\Windows\system32\kakune.dll2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2120
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Coor.bat2⤵PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178B
MD598adb2a7c09ada468798da50cc41281d
SHA15fbca442fa63b8a0c4e3b8335c5f4703537fdbf0
SHA2569585d17d017628659f847ded169c8b0a9c3c3d418f6b81e4f518e8ad7c3ce1fe
SHA5124ec59d5bafecb220a8228ee588682f6e77fa5e7439c060965c4fa01f285b3a30a4a7684de43d51b11acce4ecaaf94998b26fe584fb25719d9366f60c8d13864a
-
Filesize
178B
MD598adb2a7c09ada468798da50cc41281d
SHA15fbca442fa63b8a0c4e3b8335c5f4703537fdbf0
SHA2569585d17d017628659f847ded169c8b0a9c3c3d418f6b81e4f518e8ad7c3ce1fe
SHA5124ec59d5bafecb220a8228ee588682f6e77fa5e7439c060965c4fa01f285b3a30a4a7684de43d51b11acce4ecaaf94998b26fe584fb25719d9366f60c8d13864a
-
Filesize
194KB
MD5b67eab8e23959baee152d8d0f89a8f60
SHA1cc717f1290d4b5600e6c94fb28c587f3c599e199
SHA2565f5c2b5ae33b9b20e0772cd37bb4c12d2673306eecab68169cc2e8f06bb6a2f2
SHA5128013b3ec95fcab3cc0b19f320471cb7db8ccfdccd8a3be0f64c98d8d4ea7ef8c90b95cf56136a4e987e7ea1ad88af7aaa94d44f569f4b835a7ef06a65a88989e
-
Filesize
194KB
MD5b67eab8e23959baee152d8d0f89a8f60
SHA1cc717f1290d4b5600e6c94fb28c587f3c599e199
SHA2565f5c2b5ae33b9b20e0772cd37bb4c12d2673306eecab68169cc2e8f06bb6a2f2
SHA5128013b3ec95fcab3cc0b19f320471cb7db8ccfdccd8a3be0f64c98d8d4ea7ef8c90b95cf56136a4e987e7ea1ad88af7aaa94d44f569f4b835a7ef06a65a88989e