Analysis

  • max time kernel
    160s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2023, 18:30

General

  • Target

    NEAS.c2f0d2e07b5a831e349a11a9cee94b40.exe

  • Size

    119KB

  • MD5

    c2f0d2e07b5a831e349a11a9cee94b40

  • SHA1

    016814b29cdfdab6638416133ecdeae04d81829f

  • SHA256

    5892fc5e14c30afeefa10e8cefd7be84a1365a38d834e480e1b0de64f2cec240

  • SHA512

    9e188e1d6ed816c2fd7f71742ba1ae252c463328ca4576563b46264df4cce33374ccea4bf3ca942d5da43c1c9222c94c901593278602bf8422b55625149a00a1

  • SSDEEP

    3072:WeHpoH+dP22O9txYXA+enbRkY8fpzxOEO2PbqN7jRVj0idUB1:RHqHce5ugqJEco7Pc1

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 9 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.c2f0d2e07b5a831e349a11a9cee94b40.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.c2f0d2e07b5a831e349a11a9cee94b40.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4820
    • C:\Windows\SysWOW64\urdvxc.exe
      C:\Windows\system32\urdvxc.exe /installservice
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:3984
    • C:\Windows\SysWOW64\urdvxc.exe
      C:\Windows\system32\urdvxc.exe /start
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      PID:4260
    • C:\Windows\SysWOW64\urdvxc.exe
      C:\Windows\system32\urdvxc.exe /uninstallservice patch:C:\Users\Admin\AppData\Local\Temp\NEAS.c2f0d2e07b5a831e349a11a9cee94b40.exe
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      PID:3560
  • C:\Windows\SysWOW64\urdvxc.exe
    "C:\Windows\SysWOW64\urdvxc.exe" /service
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies registry class
    PID:2356

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\urdvxc.exe

    Filesize

    119KB

    MD5

    c2f0d2e07b5a831e349a11a9cee94b40

    SHA1

    016814b29cdfdab6638416133ecdeae04d81829f

    SHA256

    5892fc5e14c30afeefa10e8cefd7be84a1365a38d834e480e1b0de64f2cec240

    SHA512

    9e188e1d6ed816c2fd7f71742ba1ae252c463328ca4576563b46264df4cce33374ccea4bf3ca942d5da43c1c9222c94c901593278602bf8422b55625149a00a1

  • C:\Windows\SysWOW64\urdvxc.exe

    Filesize

    119KB

    MD5

    c2f0d2e07b5a831e349a11a9cee94b40

    SHA1

    016814b29cdfdab6638416133ecdeae04d81829f

    SHA256

    5892fc5e14c30afeefa10e8cefd7be84a1365a38d834e480e1b0de64f2cec240

    SHA512

    9e188e1d6ed816c2fd7f71742ba1ae252c463328ca4576563b46264df4cce33374ccea4bf3ca942d5da43c1c9222c94c901593278602bf8422b55625149a00a1

  • C:\Windows\SysWOW64\urdvxc.exe

    Filesize

    119KB

    MD5

    c2f0d2e07b5a831e349a11a9cee94b40

    SHA1

    016814b29cdfdab6638416133ecdeae04d81829f

    SHA256

    5892fc5e14c30afeefa10e8cefd7be84a1365a38d834e480e1b0de64f2cec240

    SHA512

    9e188e1d6ed816c2fd7f71742ba1ae252c463328ca4576563b46264df4cce33374ccea4bf3ca942d5da43c1c9222c94c901593278602bf8422b55625149a00a1

  • C:\Windows\SysWOW64\urdvxc.exe

    Filesize

    119KB

    MD5

    c2f0d2e07b5a831e349a11a9cee94b40

    SHA1

    016814b29cdfdab6638416133ecdeae04d81829f

    SHA256

    5892fc5e14c30afeefa10e8cefd7be84a1365a38d834e480e1b0de64f2cec240

    SHA512

    9e188e1d6ed816c2fd7f71742ba1ae252c463328ca4576563b46264df4cce33374ccea4bf3ca942d5da43c1c9222c94c901593278602bf8422b55625149a00a1

  • C:\Windows\SysWOW64\urdvxc.exe

    Filesize

    119KB

    MD5

    c2f0d2e07b5a831e349a11a9cee94b40

    SHA1

    016814b29cdfdab6638416133ecdeae04d81829f

    SHA256

    5892fc5e14c30afeefa10e8cefd7be84a1365a38d834e480e1b0de64f2cec240

    SHA512

    9e188e1d6ed816c2fd7f71742ba1ae252c463328ca4576563b46264df4cce33374ccea4bf3ca942d5da43c1c9222c94c901593278602bf8422b55625149a00a1

  • memory/2356-43-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-62-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-13-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-1035-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-80-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-79-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-78-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-77-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-44-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-14-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-20-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-21-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-22-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-23-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-24-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-25-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-26-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-27-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-28-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-29-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-30-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-31-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-32-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-33-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-34-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-46-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-36-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-37-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-38-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-39-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-40-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-41-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-42-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-76-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-75-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-74-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-35-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-45-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-49-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-73-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-50-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-51-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-52-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-53-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-54-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-55-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-56-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-57-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-58-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-59-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-60-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-61-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-11-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-63-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-64-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-65-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-66-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-67-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-68-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-69-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-70-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-71-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/2356-72-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/3560-17-0x00000000001C0000-0x00000000001DF000-memory.dmp

    Filesize

    124KB

  • memory/3984-48-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/3984-7-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/4260-47-0x00000000001C0000-0x00000000001DF000-memory.dmp

    Filesize

    124KB

  • memory/4260-9-0x00000000001C0000-0x00000000001DF000-memory.dmp

    Filesize

    124KB

  • memory/4820-15-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/4820-2-0x00000000001E0000-0x00000000001FF000-memory.dmp

    Filesize

    124KB

  • memory/4820-1-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/4820-0-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB