Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
06-11-2023 03:14
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe
-
Size
124KB
-
MD5
76f50a19ce4e2b11ab0173c8e41c5ae0
-
SHA1
635a621fdbba5b9919f4efa0b345bb9fb827c9de
-
SHA256
42879c5becde13286bc051146fab9cdeea9bf2691eed2e4f22376a51542a29b7
-
SHA512
743622da16bdd1ec9d46f240c7c730c251707e721cc5cbc28cc09a99c388339eac5be62146d775668d055274d459c56de836e49ae07e64096d44f8985e711826
-
SSDEEP
3072:MU+W+qNo3e9Sy/9sWWWjG7PLFs2Woz6m0G:L+WJ9SSlGrLFs2R
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Run\Serverx = "C:\\Windows\\system32\\Serverx.exe" NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe -
Enumerates connected drives 3 TTPs 15 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened (read-only) \??\O: NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened (read-only) \??\G: NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened (read-only) \??\H: NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened (read-only) \??\J: NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened (read-only) \??\P: NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened (read-only) \??\R: NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened (read-only) \??\S: NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened (read-only) \??\E: NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened (read-only) \??\M: NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened (read-only) \??\N: NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened (read-only) \??\I: NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened (read-only) \??\T: NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened (read-only) \??\K: NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened (read-only) \??\Q: NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Serverx.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Windows\SysWOW64\Serverx.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\SmartTagInstall.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\airappinstaller.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTICO.EXE NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DW20.EXE NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\OSPPREARM.EXE NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSQRY32.EXE NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\template.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\vsta_ep32.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VPREVIEW.EXE NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2060 1916 NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe 28 PID 1916 wrote to memory of 2060 1916 NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe 28 PID 1916 wrote to memory of 2060 1916 NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe 28 PID 1916 wrote to memory of 2060 1916 NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe 28 PID 1916 wrote to memory of 1184 1916 NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe 17 PID 1916 wrote to memory of 1184 1916 NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe 17
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe"2⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.76f50a19ce4e2b11ab0173c8e41c5ae0.exe"3⤵PID:2060
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150KB
MD516d2a23a355a6d7d3f38797b9546681e
SHA124dc2ced9c5aa5d4140341c5ae2d54185d0a8961
SHA256a78379df6adb7f3e86cd4f16a2d4e61abcae3d05faaee8d884e74730befdc82c
SHA512fa37f2c21f0b355c76a4da4a520654334572ac077235e1abd7ad52fb22a47c35a3cfa10dbf542bea4f1b3bb9fa8bbdcf6181c27fba93e4c6816de91bf6bdbd06