Analysis

  • max time kernel
    151s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2023, 19:12

General

  • Target

    NEAS.be3aeb925855edbcf000def2e24656e0.exe

  • Size

    744KB

  • MD5

    be3aeb925855edbcf000def2e24656e0

  • SHA1

    dcc0b768d1cabb65e5ba72b667595f97e99c64d6

  • SHA256

    1c71044e74dbdd2ad3ea1b774cc43ac30778e232156b8b60c502059d70d79b71

  • SHA512

    7c8e4ce92ae1b201dfb3046bd96b28fb6b5a6650b889180577fd08d6e8175572546f1d0fa14ae8de12d3793fda424965d3e2221e411d4f3c0c0d6c7682b17fbc

  • SSDEEP

    12288:wwKfOVRo9yRYlCAFHTHe4bfDKn2SjjxShnO7Zm9x90vaYF/q3OEo:wxWVeyRYl/BzZAhjjxqnO7ZmPe03to

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Checks processor information in registry 2 TTPs 15 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.be3aeb925855edbcf000def2e24656e0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.be3aeb925855edbcf000def2e24656e0.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3060
    • \??\c:\program files (x86)\common files\system\ado\en-us\operatingwindows.exe
      "c:\program files (x86)\common files\system\ado\en-us\operatingwindows.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:288
    • \??\c:\program files (x86)\common files\system\ado\fr-fr\systemmsader15.exe
      "c:\program files (x86)\common files\system\ado\fr-fr\systemmsader15.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:2956
    • \??\c:\program files (x86)\adobe\reader 9.0\reader\plug_ins\adobeadobe.exe
      "c:\program files (x86)\adobe\reader 9.0\reader\plug_ins\adobeadobe.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:2944
    • \??\c:\program files (x86)\windows sidebar\es-es\windowssidebar1.0.7600.16385.exe
      "c:\program files (x86)\windows sidebar\es-es\windowssidebar1.0.7600.16385.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AdobeAdobe.exe

    Filesize

    744KB

    MD5

    be3aeb925855edbcf000def2e24656e0

    SHA1

    dcc0b768d1cabb65e5ba72b667595f97e99c64d6

    SHA256

    1c71044e74dbdd2ad3ea1b774cc43ac30778e232156b8b60c502059d70d79b71

    SHA512

    7c8e4ce92ae1b201dfb3046bd96b28fb6b5a6650b889180577fd08d6e8175572546f1d0fa14ae8de12d3793fda424965d3e2221e411d4f3c0c0d6c7682b17fbc

  • C:\Program Files (x86)\Common Files\System\ado\en-US\OperatingWindows.exe

    Filesize

    744KB

    MD5

    be3aeb925855edbcf000def2e24656e0

    SHA1

    dcc0b768d1cabb65e5ba72b667595f97e99c64d6

    SHA256

    1c71044e74dbdd2ad3ea1b774cc43ac30778e232156b8b60c502059d70d79b71

    SHA512

    7c8e4ce92ae1b201dfb3046bd96b28fb6b5a6650b889180577fd08d6e8175572546f1d0fa14ae8de12d3793fda424965d3e2221e411d4f3c0c0d6c7682b17fbc

  • C:\Program Files (x86)\Common Files\System\ado\fr-FR\Systemmsader15.exe

    Filesize

    744KB

    MD5

    be3aeb925855edbcf000def2e24656e0

    SHA1

    dcc0b768d1cabb65e5ba72b667595f97e99c64d6

    SHA256

    1c71044e74dbdd2ad3ea1b774cc43ac30778e232156b8b60c502059d70d79b71

    SHA512

    7c8e4ce92ae1b201dfb3046bd96b28fb6b5a6650b889180577fd08d6e8175572546f1d0fa14ae8de12d3793fda424965d3e2221e411d4f3c0c0d6c7682b17fbc

  • C:\Program Files (x86)\Common Files\System\msadc\de-DE\Systemmsadcfr.exe

    Filesize

    744KB

    MD5

    be3aeb925855edbcf000def2e24656e0

    SHA1

    dcc0b768d1cabb65e5ba72b667595f97e99c64d6

    SHA256

    1c71044e74dbdd2ad3ea1b774cc43ac30778e232156b8b60c502059d70d79b71

    SHA512

    7c8e4ce92ae1b201dfb3046bd96b28fb6b5a6650b889180577fd08d6e8175572546f1d0fa14ae8de12d3793fda424965d3e2221e411d4f3c0c0d6c7682b17fbc

  • C:\Program Files (x86)\Windows Sidebar\es-ES\Windowssidebar1.0.7600.16385.exe

    Filesize

    745KB

    MD5

    0a485a003339d4b5db62a15688064ec8

    SHA1

    b96cf2e84996d6741d388d54208d2d8f4daa15a0

    SHA256

    a9b1a53cfc73c480b3da5fe3cd5c2f79b9b370a9aa9b58ceccd8a0aa919adcaf

    SHA512

    2e1b2b62e13a2876e147eaa2b4655ad19d98ea62f579d04a2ecebdcf07d7ad816337f9b2367c5e5ca5a7f442ba5badfc5c3fc99fbb0fa781949d0d4cc6cecc3f

  • C:\Program Files (x86)\Windows Sidebar\es-ES\Windowssidebar1.0.7600.16385.exe

    Filesize

    745KB

    MD5

    0a485a003339d4b5db62a15688064ec8

    SHA1

    b96cf2e84996d6741d388d54208d2d8f4daa15a0

    SHA256

    a9b1a53cfc73c480b3da5fe3cd5c2f79b9b370a9aa9b58ceccd8a0aa919adcaf

    SHA512

    2e1b2b62e13a2876e147eaa2b4655ad19d98ea62f579d04a2ecebdcf07d7ad816337f9b2367c5e5ca5a7f442ba5badfc5c3fc99fbb0fa781949d0d4cc6cecc3f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HYJJYCDH\getfile[2].htm

    Filesize

    40KB

    MD5

    c2452688e1684568901944adadaecbf2

    SHA1

    7353e671a85bdd4b0faba65814255cc5a8e7298e

    SHA256

    1de09e57eda674c25083d14728a74cc63b6a5b81dd339c031dc60d33d4dac224

    SHA512

    72a3ec20b0e131a29b58f0863f737c8a45f0e2a43710c46308e6e786e8e02aa8b015bb80622acc9fe629f207e02114fbb05ff0de6f3dbdf9e93457efd9569919

  • \Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AdobeAdobe.exe

    Filesize

    744KB

    MD5

    be3aeb925855edbcf000def2e24656e0

    SHA1

    dcc0b768d1cabb65e5ba72b667595f97e99c64d6

    SHA256

    1c71044e74dbdd2ad3ea1b774cc43ac30778e232156b8b60c502059d70d79b71

    SHA512

    7c8e4ce92ae1b201dfb3046bd96b28fb6b5a6650b889180577fd08d6e8175572546f1d0fa14ae8de12d3793fda424965d3e2221e411d4f3c0c0d6c7682b17fbc

  • \Program Files (x86)\Common Files\System\ado\en-US\OperatingWindows.exe

    Filesize

    744KB

    MD5

    be3aeb925855edbcf000def2e24656e0

    SHA1

    dcc0b768d1cabb65e5ba72b667595f97e99c64d6

    SHA256

    1c71044e74dbdd2ad3ea1b774cc43ac30778e232156b8b60c502059d70d79b71

    SHA512

    7c8e4ce92ae1b201dfb3046bd96b28fb6b5a6650b889180577fd08d6e8175572546f1d0fa14ae8de12d3793fda424965d3e2221e411d4f3c0c0d6c7682b17fbc

  • \Program Files (x86)\Common Files\System\ado\fr-FR\Systemmsader15.exe

    Filesize

    744KB

    MD5

    be3aeb925855edbcf000def2e24656e0

    SHA1

    dcc0b768d1cabb65e5ba72b667595f97e99c64d6

    SHA256

    1c71044e74dbdd2ad3ea1b774cc43ac30778e232156b8b60c502059d70d79b71

    SHA512

    7c8e4ce92ae1b201dfb3046bd96b28fb6b5a6650b889180577fd08d6e8175572546f1d0fa14ae8de12d3793fda424965d3e2221e411d4f3c0c0d6c7682b17fbc

  • \Program Files (x86)\Windows Sidebar\es-ES\Windowssidebar1.0.7600.16385.exe

    Filesize

    745KB

    MD5

    0a485a003339d4b5db62a15688064ec8

    SHA1

    b96cf2e84996d6741d388d54208d2d8f4daa15a0

    SHA256

    a9b1a53cfc73c480b3da5fe3cd5c2f79b9b370a9aa9b58ceccd8a0aa919adcaf

    SHA512

    2e1b2b62e13a2876e147eaa2b4655ad19d98ea62f579d04a2ecebdcf07d7ad816337f9b2367c5e5ca5a7f442ba5badfc5c3fc99fbb0fa781949d0d4cc6cecc3f