Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
05/11/2023, 20:46
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe
-
Size
1.2MB
-
MD5
bb328d80fd48ed4ba38e940d6c6e4940
-
SHA1
aae8c44d52ddb51ecf30dd810fdf6d8c6d4ffe11
-
SHA256
1f42a5587776ae05d3a75c975acb3e008b2718d9efbd0df2063df86cd831f60b
-
SHA512
04e53e666c174006ced4b6940fbd5920ab13c0b55123de58eee699de21e2c9ebd76bdc537869cedc5f3c78a13bc72a0d106b11c39978bd202952d93fa486b1ad
-
SSDEEP
24576:Tj+cktriK2PVboYTicnT1SBb//wDKULTrhSFkOTu+FMy:+SPVboYTVABjRGtSFruNy
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2560 explorer.exe 2436 spoolsv.exe 2792 svchost.exe 2828 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 2560 explorer.exe 2560 explorer.exe 2436 spoolsv.exe 2436 spoolsv.exe 2792 svchost.exe 2792 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 36 IoCs
pid Process 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 2560 explorer.exe 2436 spoolsv.exe 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 2792 svchost.exe 2828 spoolsv.exe 2436 spoolsv.exe 2560 explorer.exe 2792 svchost.exe 2560 explorer.exe 2792 svchost.exe 2560 explorer.exe 2792 svchost.exe 2560 explorer.exe 2792 svchost.exe 2560 explorer.exe 2792 svchost.exe 2560 explorer.exe 2792 svchost.exe 2560 explorer.exe 2792 svchost.exe 2560 explorer.exe 2792 svchost.exe 2560 explorer.exe 2792 svchost.exe 2560 explorer.exe 2792 svchost.exe 2560 explorer.exe 2792 svchost.exe 2560 explorer.exe 2792 svchost.exe 2560 explorer.exe 2792 svchost.exe 2560 explorer.exe 2792 svchost.exe 2560 explorer.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1672 schtasks.exe 1972 schtasks.exe 1700 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2792 svchost.exe 2792 svchost.exe 2792 svchost.exe 2792 svchost.exe 2792 svchost.exe 2792 svchost.exe 2792 svchost.exe 2792 svchost.exe 2792 svchost.exe 2792 svchost.exe 2792 svchost.exe 2792 svchost.exe 2792 svchost.exe 2792 svchost.exe 2792 svchost.exe 2792 svchost.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2792 svchost.exe 2792 svchost.exe 2560 explorer.exe 2792 svchost.exe 2560 explorer.exe 2792 svchost.exe 2792 svchost.exe 2560 explorer.exe 2792 svchost.exe 2560 explorer.exe 2560 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2560 explorer.exe 2792 svchost.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 2560 explorer.exe 2560 explorer.exe 2560 explorer.exe 2436 spoolsv.exe 2436 spoolsv.exe 2436 spoolsv.exe 2792 svchost.exe 2792 svchost.exe 2792 svchost.exe 2828 spoolsv.exe 2828 spoolsv.exe 2828 spoolsv.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2560 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 28 PID 2380 wrote to memory of 2560 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 28 PID 2380 wrote to memory of 2560 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 28 PID 2380 wrote to memory of 2560 2380 NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe 28 PID 2560 wrote to memory of 2436 2560 explorer.exe 29 PID 2560 wrote to memory of 2436 2560 explorer.exe 29 PID 2560 wrote to memory of 2436 2560 explorer.exe 29 PID 2560 wrote to memory of 2436 2560 explorer.exe 29 PID 2436 wrote to memory of 2792 2436 spoolsv.exe 30 PID 2436 wrote to memory of 2792 2436 spoolsv.exe 30 PID 2436 wrote to memory of 2792 2436 spoolsv.exe 30 PID 2436 wrote to memory of 2792 2436 spoolsv.exe 30 PID 2792 wrote to memory of 2828 2792 svchost.exe 31 PID 2792 wrote to memory of 2828 2792 svchost.exe 31 PID 2792 wrote to memory of 2828 2792 svchost.exe 31 PID 2792 wrote to memory of 2828 2792 svchost.exe 31 PID 2560 wrote to memory of 2648 2560 explorer.exe 32 PID 2560 wrote to memory of 2648 2560 explorer.exe 32 PID 2560 wrote to memory of 2648 2560 explorer.exe 32 PID 2560 wrote to memory of 2648 2560 explorer.exe 32 PID 2792 wrote to memory of 1972 2792 svchost.exe 33 PID 2792 wrote to memory of 1972 2792 svchost.exe 33 PID 2792 wrote to memory of 1972 2792 svchost.exe 33 PID 2792 wrote to memory of 1972 2792 svchost.exe 33 PID 2792 wrote to memory of 1700 2792 svchost.exe 38 PID 2792 wrote to memory of 1700 2792 svchost.exe 38 PID 2792 wrote to memory of 1700 2792 svchost.exe 38 PID 2792 wrote to memory of 1700 2792 svchost.exe 38 PID 2792 wrote to memory of 1672 2792 svchost.exe 40 PID 2792 wrote to memory of 1672 2792 svchost.exe 40 PID 2792 wrote to memory of 1672 2792 svchost.exe 40 PID 2792 wrote to memory of 1672 2792 svchost.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.bb328d80fd48ed4ba38e940d6c6e4940.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2828
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 20:48 /f5⤵
- Creates scheduled task(s)
PID:1972
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 20:49 /f5⤵
- Creates scheduled task(s)
PID:1700
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 20:50 /f5⤵
- Creates scheduled task(s)
PID:1672
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2648
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD50d6d601cf7dea9e7108e249b361387e6
SHA1cd9dde54b8468b9161962a14d50a994f60312d41
SHA2560f76f07f884bc9853b284987f566d836b3777d2c0fd93bf689facc8cf83781a6
SHA51209d667fde6fd55955268b95f4b9df3322a02fb34fd11a0b6b1c24691ed5789d987391fa26542e2fbc845b2ec8f68a0e2fd376713db8c2d8158b372cebab62875
-
Filesize
1.2MB
MD50d6d601cf7dea9e7108e249b361387e6
SHA1cd9dde54b8468b9161962a14d50a994f60312d41
SHA2560f76f07f884bc9853b284987f566d836b3777d2c0fd93bf689facc8cf83781a6
SHA51209d667fde6fd55955268b95f4b9df3322a02fb34fd11a0b6b1c24691ed5789d987391fa26542e2fbc845b2ec8f68a0e2fd376713db8c2d8158b372cebab62875
-
Filesize
1.2MB
MD563de2d03f6e84fd5caa34aace0aec4f1
SHA1ad7426edad55c71ca47a0ec41232b20e9c8144f8
SHA2564057f57b97ac9ddaba161b6aab163db39e9631ae66970477f9df51b8eb6f5e91
SHA51296ab047018d8ca4e80b87656a432241208fc0ed8a95f505b190600e6d35ef23a29287ca7a4cd24bbcc7919115ebfcbf0134becbd963f21efd130b1d82af0d4e6
-
Filesize
1.2MB
MD563de2d03f6e84fd5caa34aace0aec4f1
SHA1ad7426edad55c71ca47a0ec41232b20e9c8144f8
SHA2564057f57b97ac9ddaba161b6aab163db39e9631ae66970477f9df51b8eb6f5e91
SHA51296ab047018d8ca4e80b87656a432241208fc0ed8a95f505b190600e6d35ef23a29287ca7a4cd24bbcc7919115ebfcbf0134becbd963f21efd130b1d82af0d4e6
-
Filesize
1.2MB
MD51245528f4efe6ea02d90b5f12d9724ef
SHA18fd06eca3285c1acf009f821d8decc92c4be62eb
SHA2569ce7470e81dc7bf2e9f22678507b73dbe40a98da053e54771177cc1813e893c7
SHA512f774cbaf9543fe355d40a9ed4a961105875f825e11cc50b9e9839879f442a64a5d4ab612cf9f2309ce42dfae0d4e6bfec88b8304c47504ab46619c06ac5749be
-
Filesize
1.2MB
MD563de2d03f6e84fd5caa34aace0aec4f1
SHA1ad7426edad55c71ca47a0ec41232b20e9c8144f8
SHA2564057f57b97ac9ddaba161b6aab163db39e9631ae66970477f9df51b8eb6f5e91
SHA51296ab047018d8ca4e80b87656a432241208fc0ed8a95f505b190600e6d35ef23a29287ca7a4cd24bbcc7919115ebfcbf0134becbd963f21efd130b1d82af0d4e6
-
Filesize
1.2MB
MD51245528f4efe6ea02d90b5f12d9724ef
SHA18fd06eca3285c1acf009f821d8decc92c4be62eb
SHA2569ce7470e81dc7bf2e9f22678507b73dbe40a98da053e54771177cc1813e893c7
SHA512f774cbaf9543fe355d40a9ed4a961105875f825e11cc50b9e9839879f442a64a5d4ab612cf9f2309ce42dfae0d4e6bfec88b8304c47504ab46619c06ac5749be
-
Filesize
1.2MB
MD50d6d601cf7dea9e7108e249b361387e6
SHA1cd9dde54b8468b9161962a14d50a994f60312d41
SHA2560f76f07f884bc9853b284987f566d836b3777d2c0fd93bf689facc8cf83781a6
SHA51209d667fde6fd55955268b95f4b9df3322a02fb34fd11a0b6b1c24691ed5789d987391fa26542e2fbc845b2ec8f68a0e2fd376713db8c2d8158b372cebab62875
-
Filesize
1.2MB
MD50d6d601cf7dea9e7108e249b361387e6
SHA1cd9dde54b8468b9161962a14d50a994f60312d41
SHA2560f76f07f884bc9853b284987f566d836b3777d2c0fd93bf689facc8cf83781a6
SHA51209d667fde6fd55955268b95f4b9df3322a02fb34fd11a0b6b1c24691ed5789d987391fa26542e2fbc845b2ec8f68a0e2fd376713db8c2d8158b372cebab62875
-
Filesize
1.2MB
MD50d6d601cf7dea9e7108e249b361387e6
SHA1cd9dde54b8468b9161962a14d50a994f60312d41
SHA2560f76f07f884bc9853b284987f566d836b3777d2c0fd93bf689facc8cf83781a6
SHA51209d667fde6fd55955268b95f4b9df3322a02fb34fd11a0b6b1c24691ed5789d987391fa26542e2fbc845b2ec8f68a0e2fd376713db8c2d8158b372cebab62875
-
Filesize
1.2MB
MD563de2d03f6e84fd5caa34aace0aec4f1
SHA1ad7426edad55c71ca47a0ec41232b20e9c8144f8
SHA2564057f57b97ac9ddaba161b6aab163db39e9631ae66970477f9df51b8eb6f5e91
SHA51296ab047018d8ca4e80b87656a432241208fc0ed8a95f505b190600e6d35ef23a29287ca7a4cd24bbcc7919115ebfcbf0134becbd963f21efd130b1d82af0d4e6
-
Filesize
1.2MB
MD563de2d03f6e84fd5caa34aace0aec4f1
SHA1ad7426edad55c71ca47a0ec41232b20e9c8144f8
SHA2564057f57b97ac9ddaba161b6aab163db39e9631ae66970477f9df51b8eb6f5e91
SHA51296ab047018d8ca4e80b87656a432241208fc0ed8a95f505b190600e6d35ef23a29287ca7a4cd24bbcc7919115ebfcbf0134becbd963f21efd130b1d82af0d4e6
-
Filesize
1.2MB
MD563de2d03f6e84fd5caa34aace0aec4f1
SHA1ad7426edad55c71ca47a0ec41232b20e9c8144f8
SHA2564057f57b97ac9ddaba161b6aab163db39e9631ae66970477f9df51b8eb6f5e91
SHA51296ab047018d8ca4e80b87656a432241208fc0ed8a95f505b190600e6d35ef23a29287ca7a4cd24bbcc7919115ebfcbf0134becbd963f21efd130b1d82af0d4e6
-
Filesize
1.2MB
MD563de2d03f6e84fd5caa34aace0aec4f1
SHA1ad7426edad55c71ca47a0ec41232b20e9c8144f8
SHA2564057f57b97ac9ddaba161b6aab163db39e9631ae66970477f9df51b8eb6f5e91
SHA51296ab047018d8ca4e80b87656a432241208fc0ed8a95f505b190600e6d35ef23a29287ca7a4cd24bbcc7919115ebfcbf0134becbd963f21efd130b1d82af0d4e6
-
Filesize
1.2MB
MD51245528f4efe6ea02d90b5f12d9724ef
SHA18fd06eca3285c1acf009f821d8decc92c4be62eb
SHA2569ce7470e81dc7bf2e9f22678507b73dbe40a98da053e54771177cc1813e893c7
SHA512f774cbaf9543fe355d40a9ed4a961105875f825e11cc50b9e9839879f442a64a5d4ab612cf9f2309ce42dfae0d4e6bfec88b8304c47504ab46619c06ac5749be
-
Filesize
1.2MB
MD51245528f4efe6ea02d90b5f12d9724ef
SHA18fd06eca3285c1acf009f821d8decc92c4be62eb
SHA2569ce7470e81dc7bf2e9f22678507b73dbe40a98da053e54771177cc1813e893c7
SHA512f774cbaf9543fe355d40a9ed4a961105875f825e11cc50b9e9839879f442a64a5d4ab612cf9f2309ce42dfae0d4e6bfec88b8304c47504ab46619c06ac5749be