Analysis
-
max time kernel
137s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2023, 09:58
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0f8b98f4ea5644f10e0d5a408918fd59.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.0f8b98f4ea5644f10e0d5a408918fd59.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.0f8b98f4ea5644f10e0d5a408918fd59.exe
-
Size
1.3MB
-
MD5
0f8b98f4ea5644f10e0d5a408918fd59
-
SHA1
65ef8c4b0e2d022344702ff85ccac3667c64082d
-
SHA256
12e997326fff5f9cbab2656938be3694654fd404f9c2e70bc14201bc25f3e694
-
SHA512
1df86fd47fa510d5318b15ed83f44716952c945f693bce86985dc68ddfdda52f4a60a3529640ca9526de187db9f5f373fc8f77affef75eb95374a82362aaa58a
-
SSDEEP
24576:ERyNPh2kkkkK4kXkkkkkkkkhLX3a20R0v50+YNpsKv2EvZHp3oW:IyFbazR0vKLXZ
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obkahddl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Obkahddl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qihoak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bmddihfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" NEAS.0f8b98f4ea5644f10e0d5a408918fd59.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llkjmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Llkjmb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncaklhdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ncaklhdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qihoak32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmddihfj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad NEAS.0f8b98f4ea5644f10e0d5a408918fd59.exe -
Executes dropped EXE 6 IoCs
pid Process 2772 Llkjmb32.exe 4572 Ncaklhdi.exe 2404 Obkahddl.exe 2228 Qihoak32.exe 3164 Bmddihfj.exe 228 Dbkhnk32.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Llkjmb32.exe NEAS.0f8b98f4ea5644f10e0d5a408918fd59.exe File created C:\Windows\SysWOW64\Ncaklhdi.exe Llkjmb32.exe File created C:\Windows\SysWOW64\Nbdenofm.dll Llkjmb32.exe File created C:\Windows\SysWOW64\Obkahddl.exe Ncaklhdi.exe File opened for modification C:\Windows\SysWOW64\Bmddihfj.exe Qihoak32.exe File opened for modification C:\Windows\SysWOW64\Ncaklhdi.exe Llkjmb32.exe File created C:\Windows\SysWOW64\Inkqjp32.dll Ncaklhdi.exe File created C:\Windows\SysWOW64\Mbgjlq32.dll Qihoak32.exe File created C:\Windows\SysWOW64\Dbkhnk32.exe Bmddihfj.exe File created C:\Windows\SysWOW64\Naefjl32.dll Bmddihfj.exe File created C:\Windows\SysWOW64\Llkjmb32.exe NEAS.0f8b98f4ea5644f10e0d5a408918fd59.exe File created C:\Windows\SysWOW64\Idjcam32.dll NEAS.0f8b98f4ea5644f10e0d5a408918fd59.exe File opened for modification C:\Windows\SysWOW64\Obkahddl.exe Ncaklhdi.exe File opened for modification C:\Windows\SysWOW64\Qihoak32.exe Obkahddl.exe File created C:\Windows\SysWOW64\Bmddihfj.exe Qihoak32.exe File opened for modification C:\Windows\SysWOW64\Dbkhnk32.exe Bmddihfj.exe File created C:\Windows\SysWOW64\Qihoak32.exe Obkahddl.exe File created C:\Windows\SysWOW64\Pmejnpqp.dll Obkahddl.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4364 228 WerFault.exe 96 2384 228 WerFault.exe 96 -
Modifies registry class 21 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qihoak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbgjlq32.dll" Qihoak32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} NEAS.0f8b98f4ea5644f10e0d5a408918fd59.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" NEAS.0f8b98f4ea5644f10e0d5a408918fd59.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Llkjmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmejnpqp.dll" Obkahddl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Obkahddl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Naefjl32.dll" Bmddihfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bmddihfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nbdenofm.dll" Llkjmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Llkjmb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ncaklhdi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bmddihfj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 NEAS.0f8b98f4ea5644f10e0d5a408918fd59.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node NEAS.0f8b98f4ea5644f10e0d5a408918fd59.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID NEAS.0f8b98f4ea5644f10e0d5a408918fd59.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idjcam32.dll" NEAS.0f8b98f4ea5644f10e0d5a408918fd59.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Inkqjp32.dll" Ncaklhdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ncaklhdi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Obkahddl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qihoak32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2772 1820 NEAS.0f8b98f4ea5644f10e0d5a408918fd59.exe 91 PID 1820 wrote to memory of 2772 1820 NEAS.0f8b98f4ea5644f10e0d5a408918fd59.exe 91 PID 1820 wrote to memory of 2772 1820 NEAS.0f8b98f4ea5644f10e0d5a408918fd59.exe 91 PID 2772 wrote to memory of 4572 2772 Llkjmb32.exe 92 PID 2772 wrote to memory of 4572 2772 Llkjmb32.exe 92 PID 2772 wrote to memory of 4572 2772 Llkjmb32.exe 92 PID 4572 wrote to memory of 2404 4572 Ncaklhdi.exe 93 PID 4572 wrote to memory of 2404 4572 Ncaklhdi.exe 93 PID 4572 wrote to memory of 2404 4572 Ncaklhdi.exe 93 PID 2404 wrote to memory of 2228 2404 Obkahddl.exe 94 PID 2404 wrote to memory of 2228 2404 Obkahddl.exe 94 PID 2404 wrote to memory of 2228 2404 Obkahddl.exe 94 PID 2228 wrote to memory of 3164 2228 Qihoak32.exe 95 PID 2228 wrote to memory of 3164 2228 Qihoak32.exe 95 PID 2228 wrote to memory of 3164 2228 Qihoak32.exe 95 PID 3164 wrote to memory of 228 3164 Bmddihfj.exe 96 PID 3164 wrote to memory of 228 3164 Bmddihfj.exe 96 PID 3164 wrote to memory of 228 3164 Bmddihfj.exe 96 PID 228 wrote to memory of 4364 228 Dbkhnk32.exe 100 PID 228 wrote to memory of 4364 228 Dbkhnk32.exe 100 PID 228 wrote to memory of 4364 228 Dbkhnk32.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.0f8b98f4ea5644f10e0d5a408918fd59.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.0f8b98f4ea5644f10e0d5a408918fd59.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\Llkjmb32.exeC:\Windows\system32\Llkjmb32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\Ncaklhdi.exeC:\Windows\system32\Ncaklhdi.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\Obkahddl.exeC:\Windows\system32\Obkahddl.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\Qihoak32.exeC:\Windows\system32\Qihoak32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\Bmddihfj.exeC:\Windows\system32\Bmddihfj.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\Dbkhnk32.exeC:\Windows\system32\Dbkhnk32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 4128⤵
- Program crash
PID:4364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 4128⤵
- Program crash
PID:2384
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 228 -ip 2281⤵PID:3480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD533dd4cd5f8399fe0026203598623ac3e
SHA103fa10f84aaa9c499c103926577fbf4882e45f49
SHA256a8341499bb748456b82d716e0b3b687a1338cfe1732dd810fb74f5990220ca85
SHA5120957dcbea18deeab872617e542fcbb5b0f15c3308ddb036ff09f0e9ad6e9779de30d3cd2da9f512aa6416fe4ca5326d61a6cee42c52e6734dd0852a2f603d72b
-
Filesize
1.3MB
MD533dd4cd5f8399fe0026203598623ac3e
SHA103fa10f84aaa9c499c103926577fbf4882e45f49
SHA256a8341499bb748456b82d716e0b3b687a1338cfe1732dd810fb74f5990220ca85
SHA5120957dcbea18deeab872617e542fcbb5b0f15c3308ddb036ff09f0e9ad6e9779de30d3cd2da9f512aa6416fe4ca5326d61a6cee42c52e6734dd0852a2f603d72b
-
Filesize
1.3MB
MD53808fa97a269d4732be43d934ae6b817
SHA11d127ec15b145a548bbe32c594020973857d50e7
SHA256289697a98615841f3707d55dbadbaae24edf628e79c2be30bea68f3aafe32b6c
SHA5125b75808a774ccebe54764eca9cdc1375c3311cdc68fbab0348452455dbad6653b25a551f8c116afb5601e6e5ad59e94676d5030bacedae122c949135b0fb875b
-
Filesize
1.3MB
MD53808fa97a269d4732be43d934ae6b817
SHA11d127ec15b145a548bbe32c594020973857d50e7
SHA256289697a98615841f3707d55dbadbaae24edf628e79c2be30bea68f3aafe32b6c
SHA5125b75808a774ccebe54764eca9cdc1375c3311cdc68fbab0348452455dbad6653b25a551f8c116afb5601e6e5ad59e94676d5030bacedae122c949135b0fb875b
-
Filesize
1.3MB
MD5c829565d5aefb2012dfe82feabc416b7
SHA115348e3e8f1bd9f95bdcfe9fc8a1291492276b71
SHA256853a304451e15b6c956f7cf485465bcb4922692931fce917eb5c52fad74c6bdb
SHA512b169968c46fbb59f892049835be6b6303a5044c68dcf382b10771461d108e0ae7455122499539cc245d861cdb8ea8851b608b538e823c3a8f548fa6195ab3352
-
Filesize
1.3MB
MD5c829565d5aefb2012dfe82feabc416b7
SHA115348e3e8f1bd9f95bdcfe9fc8a1291492276b71
SHA256853a304451e15b6c956f7cf485465bcb4922692931fce917eb5c52fad74c6bdb
SHA512b169968c46fbb59f892049835be6b6303a5044c68dcf382b10771461d108e0ae7455122499539cc245d861cdb8ea8851b608b538e823c3a8f548fa6195ab3352
-
Filesize
7KB
MD5be25a82f534e1338312563b2cace3647
SHA1e04312ecfd181ef745303831cf6c60521e40c08d
SHA256b659aad0b5ca3706b4fb0bd1ef69a98aa21579b96dcdaba428f7af918406cc66
SHA51282c5da83ebe4f6efa520446e85faf9d1da6bf812367b3381a310cffe1db3c02385a0154fa8a3ab8e58cac96960de73676e3e23a84cfc2702e391efd04ace62a1
-
Filesize
1.3MB
MD55a497feef3aaadc8574b9fa034cecc50
SHA18136821e71e2d2c69b666e10ce65c93039652059
SHA2569ec81b7bd49b066e9fa6e27f0ccb9183af458d8f927f513373318c88e03b6cc5
SHA512262ad74e15875a3fdd182ce4c1b05a252bc8da6d28ed80025b01a94c8ac0e8107d2c37a12c5e2c0ddaad56d94ebe7c4382d5297a5426c606c792ac3be72f408f
-
Filesize
1.3MB
MD55a497feef3aaadc8574b9fa034cecc50
SHA18136821e71e2d2c69b666e10ce65c93039652059
SHA2569ec81b7bd49b066e9fa6e27f0ccb9183af458d8f927f513373318c88e03b6cc5
SHA512262ad74e15875a3fdd182ce4c1b05a252bc8da6d28ed80025b01a94c8ac0e8107d2c37a12c5e2c0ddaad56d94ebe7c4382d5297a5426c606c792ac3be72f408f
-
Filesize
1.3MB
MD5a9a1412f59a797ca913dda5ca2927b63
SHA1a6f484cad23fad11c2017d1cb80393ed833dafcd
SHA2564a681dfa777493d52b5bed51ad4616723af37113ea9de724b80daaaea75fc0cf
SHA5120a22cd6ed0ce4e6b131076922512ace88ca98b2b07824c9276877baaac71f5c7f5b21f1bbef4a770ca682cf95b1f3afb0b6625e8ab460c5a44e92cb6c4789429
-
Filesize
1.3MB
MD5a9a1412f59a797ca913dda5ca2927b63
SHA1a6f484cad23fad11c2017d1cb80393ed833dafcd
SHA2564a681dfa777493d52b5bed51ad4616723af37113ea9de724b80daaaea75fc0cf
SHA5120a22cd6ed0ce4e6b131076922512ace88ca98b2b07824c9276877baaac71f5c7f5b21f1bbef4a770ca682cf95b1f3afb0b6625e8ab460c5a44e92cb6c4789429
-
Filesize
1.3MB
MD586016ba462dcc05c5caa8e7d66d3fbdd
SHA1f1e03df64fd433b2331f4fcb09514be40a4023fd
SHA256a70ac1f789b2d846a802bb55270f9faad9601ad7e236388d8ccf8e566044ae42
SHA512d1049c4ef9ea5f5ca8086ed8acf434c837f6a46b174c92cf42a5ab21ed94e2e99e8d41ac3767187b2cc72f712a07aced1b6de4625de80ddc18cf7e46ffa3c1ea
-
Filesize
1.3MB
MD5e04849130b635911d3779aa8db8ffb87
SHA16f38c6fea55cadda6c92fb05adc37ee1a18da5b4
SHA25606e8dd925a9e9b0f2f6045e2c7acc168bee0add0bc448fd41ae1b1e4c4db15a3
SHA51200f6dced8721e8bfc6feb3ad1576a915a7fc5b46a03181cde0d1aa48b8e92872add7f3336dd6a55fc59734ea606957e00e38e53c4ad497538ef4cd1078ef2bee
-
Filesize
1.3MB
MD5e04849130b635911d3779aa8db8ffb87
SHA16f38c6fea55cadda6c92fb05adc37ee1a18da5b4
SHA25606e8dd925a9e9b0f2f6045e2c7acc168bee0add0bc448fd41ae1b1e4c4db15a3
SHA51200f6dced8721e8bfc6feb3ad1576a915a7fc5b46a03181cde0d1aa48b8e92872add7f3336dd6a55fc59734ea606957e00e38e53c4ad497538ef4cd1078ef2bee