Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 21:39
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe
-
Size
147KB
-
MD5
d3210846d7e995c8faadcfa9f3839ee0
-
SHA1
9e7e41e7835d7fea4c71771f127e2b6cf0939593
-
SHA256
69177b83c05ef1e3b99716693763dcfca9e8aa69aa033dda33ea82eb4584850a
-
SHA512
7890b22609abdf5fb47f4f7393e9acd9c65ec3c44bdab1da2c5be473bc42fd8d4a9e8f91de3bd97296335f560a249c87f3dd1ee900a0333c7b5b4ab93156d715
-
SSDEEP
3072:3LVoDvPd+A4WhkhXDl+i1lApwH08TdTIIIIIIIIIIIIIIIIIIfIIIIyIIIITIIIR:ZopGGgbiwU8JF
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe spooljt.exe" NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe spooljt.exe" spooljt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe spooljt.exe" spooljt.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe Set value (int) \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" spooljt.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe Set value (int) \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" spooljt.exe -
Executes dropped EXE 2 IoCs
pid Process 2408 spooljt.exe 4072 spooljt.exe -
Modifies system executable filetype association 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\Shell\open\command NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\svchost.exe \"%1\" %*" NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\Shell\open\command NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\svchost.exe \"%1\" %*" NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\Shell\open\command NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "C:\\Windows\\svchost.exe \"%1\" %*" NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\Shell\open\command NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.exe \"%1\" %*" NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Service Host = "C:\\Windows\\spooljt.exe" NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe -
Drops file in Windows directory 30 IoCs
description ioc Process File created C:\Windows\spooljt.exe NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe File opened for modification C:\Windows\spooljt.exe NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe File created C:\Windows\message.htm spooljt.exe File opened for modification C:\Windows\.{21EC2020-3AEA-1069-A2DD-08002B30309D}\TVTool v8.31 Crack.exe spooljt.exe File created C:\Windows\svchost.exe NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe File created C:\Windows\spooljt.exe spooljt.exe File created C:\Windows\.{21EC2020-3AEA-1069-A2DD-08002B30309D}\Norton Antispam 2004 Crack.exe spooljt.exe File created C:\Windows\.{21EC2020-3AEA-1069-A2DD-08002B30309D}\TVTool v8.31 Keygen.exe spooljt.exe File created C:\Windows\.{21EC2020-3AEA-1069-A2DD-08002B30309D}\Microsoft Office System Professional V2003 Keygen.exe spooljt.exe File created C:\Windows\.{21EC2020-3AEA-1069-A2DD-08002B30309D}\Nero Burning ROM v6.0.0.19 Ultra Edition Crack.exe spooljt.exe File opened for modification C:\Windows\.{21EC2020-3AEA-1069-A2DD-08002B30309D}\Nero Burning ROM v6.0.0.19 Ultra Edition Crack.exe spooljt.exe File created C:\Windows\message.dat spooljt.exe File opened for modification C:\Windows\.{21EC2020-3AEA-1069-A2DD-08002B30309D}\Microsoft Office System Professional V2003 Keygen.exe spooljt.exe File created C:\Windows\.{21EC2020-3AEA-1069-A2DD-08002B30309D}\Norton SystemWorks 2004 Crack.exe spooljt.exe File opened for modification C:\Windows\.{21EC2020-3AEA-1069-A2DD-08002B30309D}\ spooljt.exe File opened for modification C:\Windows\.{21EC2020-3AEA-1069-A2DD-08002B30309D}\Norton SystemWorks 2004 Crack.exe spooljt.exe File created C:\Windows\.{21EC2020-3AEA-1069-A2DD-08002B30309D}\TVTool v8.31 Crack.exe spooljt.exe File opened for modification C:\Windows\svchost.exe spooljt.exe File created C:\Windows\.{21EC2020-3AEA-1069-A2DD-08002B30309D}\Macromedia Contribute 2 Crack.exe spooljt.exe File opened for modification C:\Windows\.{21EC2020-3AEA-1069-A2DD-08002B30309D}\Macromedia Contribute 2 Crack.exe spooljt.exe File created C:\Windows\.{21EC2020-3AEA-1069-A2DD-08002B30309D}\Sophos AntiVirus v3.74 Crack.exe spooljt.exe File opened for modification C:\Windows\.{21EC2020-3AEA-1069-A2DD-08002B30309D}\ NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe File opened for modification C:\Windows\svchost.exe spooljt.exe File opened for modification C:\Windows\.{21EC2020-3AEA-1069-A2DD-08002B30309D}\Norton Antispam 2004 Crack.exe spooljt.exe File created C:\Windows\.{21EC2020-3AEA-1069-A2DD-08002B30309D}\Dragon NaturallySpeaking 8 ISO Multilanguage Crack.exe spooljt.exe File opened for modification C:\Windows\.{21EC2020-3AEA-1069-A2DD-08002B30309D}\Dragon NaturallySpeaking 8 ISO Multilanguage Crack.exe spooljt.exe File opened for modification C:\Windows\.{21EC2020-3AEA-1069-A2DD-08002B30309D}\TVTool v8.31 Keygen.exe spooljt.exe File created C:\Windows\spooljt.exe spooljt.exe File opened for modification C:\Windows\.{21EC2020-3AEA-1069-A2DD-08002B30309D}\ spooljt.exe File opened for modification C:\Windows\.{21EC2020-3AEA-1069-A2DD-08002B30309D}\Sophos AntiVirus v3.74 Crack.exe spooljt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 13 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214FC-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000e7f2e9c8f910da01 spooljt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft spooljt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion spooljt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System spooljt.exe Key created \REGISTRY\USER\.DEFAULT\Software spooljt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer spooljt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" spooljt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows spooljt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" spooljt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached spooljt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "4" spooljt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced spooljt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies spooljt.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\Shell\open\command NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "C:\\Windows\\svchost.exe \"%1\" %*" NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\Shell\open\command NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.exe \"%1\" %*" NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cmdfile\Shell\open\command NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cmdfile\shell\open\command\ = "C:\\Windows\\svchost.exe \"%1\" %*" NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\Shell\open\command NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\svchost.exe \"%1\" %*" NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\svchost.exe \"%1\" %*" NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\Shell\open\command NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\Shell\open\command NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "C:\\Windows\\svchost.exe \"%1\" /S" NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4072 spooljt.exe 4072 spooljt.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5044 wrote to memory of 2408 5044 NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe 86 PID 5044 wrote to memory of 2408 5044 NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe 86 PID 5044 wrote to memory of 2408 5044 NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d3210846d7e995c8faadcfa9f3839ee0.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\spooljt.exe"C:\Windows\spooljt.exe" -xInstallOurNiceServicesYes2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Windows directory
PID:2408
-
-
C:\Windows\spooljt.exeC:\Windows\spooljt.exe -xStartOurNiceServicesYes1⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4072
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147KB
MD5d3210846d7e995c8faadcfa9f3839ee0
SHA19e7e41e7835d7fea4c71771f127e2b6cf0939593
SHA25669177b83c05ef1e3b99716693763dcfca9e8aa69aa033dda33ea82eb4584850a
SHA5127890b22609abdf5fb47f4f7393e9acd9c65ec3c44bdab1da2c5be473bc42fd8d4a9e8f91de3bd97296335f560a249c87f3dd1ee900a0333c7b5b4ab93156d715
-
Filesize
147KB
MD5d3210846d7e995c8faadcfa9f3839ee0
SHA19e7e41e7835d7fea4c71771f127e2b6cf0939593
SHA25669177b83c05ef1e3b99716693763dcfca9e8aa69aa033dda33ea82eb4584850a
SHA5127890b22609abdf5fb47f4f7393e9acd9c65ec3c44bdab1da2c5be473bc42fd8d4a9e8f91de3bd97296335f560a249c87f3dd1ee900a0333c7b5b4ab93156d715
-
Filesize
147KB
MD5d3210846d7e995c8faadcfa9f3839ee0
SHA19e7e41e7835d7fea4c71771f127e2b6cf0939593
SHA25669177b83c05ef1e3b99716693763dcfca9e8aa69aa033dda33ea82eb4584850a
SHA5127890b22609abdf5fb47f4f7393e9acd9c65ec3c44bdab1da2c5be473bc42fd8d4a9e8f91de3bd97296335f560a249c87f3dd1ee900a0333c7b5b4ab93156d715
-
Filesize
147KB
MD5d3210846d7e995c8faadcfa9f3839ee0
SHA19e7e41e7835d7fea4c71771f127e2b6cf0939593
SHA25669177b83c05ef1e3b99716693763dcfca9e8aa69aa033dda33ea82eb4584850a
SHA5127890b22609abdf5fb47f4f7393e9acd9c65ec3c44bdab1da2c5be473bc42fd8d4a9e8f91de3bd97296335f560a249c87f3dd1ee900a0333c7b5b4ab93156d715
-
Filesize
147KB
MD5d3210846d7e995c8faadcfa9f3839ee0
SHA19e7e41e7835d7fea4c71771f127e2b6cf0939593
SHA25669177b83c05ef1e3b99716693763dcfca9e8aa69aa033dda33ea82eb4584850a
SHA5127890b22609abdf5fb47f4f7393e9acd9c65ec3c44bdab1da2c5be473bc42fd8d4a9e8f91de3bd97296335f560a249c87f3dd1ee900a0333c7b5b4ab93156d715