Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
11/11/2023, 11:02
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.df88d6502e133a163ef59dc961ed51e8b185e769ef1d0568d7df76936bed1d67.exe
Resource
win7-20231023-en
5 signatures
150 seconds
General
-
Target
NEAS.df88d6502e133a163ef59dc961ed51e8b185e769ef1d0568d7df76936bed1d67.exe
-
Size
17.5MB
-
MD5
2ceba1e2864f7965a9154c54c75db8d5
-
SHA1
da53dc70059f5697d2bd0a58c7a9423e240b2194
-
SHA256
df88d6502e133a163ef59dc961ed51e8b185e769ef1d0568d7df76936bed1d67
-
SHA512
dad34912bb55c1ebe2ae7fad729de5bdc3366a826985e20ddb45f538bf64fc13023d7d01400abbbbc69a97b2234ef0f27f3109772e86325d56a86316d87b2fa4
-
SSDEEP
393216:8W7yDgR8mOUmAUrLEeBh8TmLynyH09kW2elluldA805:NyMRxC8GomLpH7e7mdJq
Score
6/10
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: NEAS.df88d6502e133a163ef59dc961ed51e8b185e769ef1d0568d7df76936bed1d67.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION NEAS.df88d6502e133a163ef59dc961ed51e8b185e769ef1d0568d7df76936bed1d67.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Main NEAS.df88d6502e133a163ef59dc961ed51e8b185e769ef1d0568d7df76936bed1d67.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl NEAS.df88d6502e133a163ef59dc961ed51e8b185e769ef1d0568d7df76936bed1d67.exe Set value (int) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\NEAS.df88d6502e133a163ef59dc961ed51e8b185e769ef1d0568d7df76936bed1d67.exe = "11000" NEAS.df88d6502e133a163ef59dc961ed51e8b185e769ef1d0568d7df76936bed1d67.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2968 NEAS.df88d6502e133a163ef59dc961ed51e8b185e769ef1d0568d7df76936bed1d67.exe 2968 NEAS.df88d6502e133a163ef59dc961ed51e8b185e769ef1d0568d7df76936bed1d67.exe 2968 NEAS.df88d6502e133a163ef59dc961ed51e8b185e769ef1d0568d7df76936bed1d67.exe 2968 NEAS.df88d6502e133a163ef59dc961ed51e8b185e769ef1d0568d7df76936bed1d67.exe 2968 NEAS.df88d6502e133a163ef59dc961ed51e8b185e769ef1d0568d7df76936bed1d67.exe 2968 NEAS.df88d6502e133a163ef59dc961ed51e8b185e769ef1d0568d7df76936bed1d67.exe 2968 NEAS.df88d6502e133a163ef59dc961ed51e8b185e769ef1d0568d7df76936bed1d67.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2968 NEAS.df88d6502e133a163ef59dc961ed51e8b185e769ef1d0568d7df76936bed1d67.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2968 NEAS.df88d6502e133a163ef59dc961ed51e8b185e769ef1d0568d7df76936bed1d67.exe 2968 NEAS.df88d6502e133a163ef59dc961ed51e8b185e769ef1d0568d7df76936bed1d67.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.df88d6502e133a163ef59dc961ed51e8b185e769ef1d0568d7df76936bed1d67.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.df88d6502e133a163ef59dc961ed51e8b185e769ef1d0568d7df76936bed1d67.exe"1⤵
- Enumerates connected drives
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2968