Analysis
-
max time kernel
73s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2023 21:48
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.7236baf952a8adbea6667ed066c1b4e0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.7236baf952a8adbea6667ed066c1b4e0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.7236baf952a8adbea6667ed066c1b4e0.exe
-
Size
211KB
-
MD5
7236baf952a8adbea6667ed066c1b4e0
-
SHA1
ac635d4036085f49543afe2379f2a8c8b3fdec4b
-
SHA256
e0d11b7c94d1a41391deecadaaaad2749125dd0a8f632dbb61f0d0b9c2c6301d
-
SHA512
0ab8b07443f1676398ec9d4d36cbd8f1d05ca398fcb5f324e188768de65d3d2ab1ece74c55ca0a4ce25d6eed21d3df00156f9707c4a6289940d07171a094c440
-
SSDEEP
3072:vDEPeJlYW1ea8HKHSRUN3jjXs9Y+MiMVB/w68PEAjAfIrAvGPZz6sPJBIiFe/GcC:vSAl1IK1aY+MiMVBSes
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" swchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" swchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" userinit.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" userinit.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1672 userinit.exe 3836 spoolsw.exe 1516 swchost.exe 3404 spoolsw.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" swchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\udsys.exe userinit.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\userinit.exe NEAS.7236baf952a8adbea6667ed066c1b4e0.exe File opened for modification \??\c:\windows\spoolsw.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe spoolsw.exe File opened for modification \??\c:\windows\userinit.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe swchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3976 NEAS.7236baf952a8adbea6667ed066c1b4e0.exe 3976 NEAS.7236baf952a8adbea6667ed066c1b4e0.exe 1672 userinit.exe 1672 userinit.exe 1672 userinit.exe 1672 userinit.exe 1672 userinit.exe 1672 userinit.exe 1516 swchost.exe 1516 swchost.exe 1516 swchost.exe 1516 swchost.exe 1672 userinit.exe 1672 userinit.exe 1516 swchost.exe 1516 swchost.exe 1672 userinit.exe 1672 userinit.exe 1516 swchost.exe 1516 swchost.exe 1672 userinit.exe 1672 userinit.exe 1516 swchost.exe 1516 swchost.exe 1672 userinit.exe 1672 userinit.exe 1516 swchost.exe 1516 swchost.exe 1672 userinit.exe 1672 userinit.exe 1516 swchost.exe 1516 swchost.exe 1672 userinit.exe 1672 userinit.exe 1516 swchost.exe 1516 swchost.exe 1672 userinit.exe 1672 userinit.exe 1516 swchost.exe 1516 swchost.exe 1672 userinit.exe 1672 userinit.exe 1516 swchost.exe 1516 swchost.exe 1672 userinit.exe 1672 userinit.exe 1516 swchost.exe 1516 swchost.exe 1672 userinit.exe 1672 userinit.exe 1516 swchost.exe 1516 swchost.exe 1672 userinit.exe 1672 userinit.exe 1516 swchost.exe 1516 swchost.exe 1672 userinit.exe 1672 userinit.exe 1516 swchost.exe 1516 swchost.exe 1672 userinit.exe 1672 userinit.exe 1516 swchost.exe 1516 swchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1672 userinit.exe 1516 swchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3976 NEAS.7236baf952a8adbea6667ed066c1b4e0.exe 3976 NEAS.7236baf952a8adbea6667ed066c1b4e0.exe 1672 userinit.exe 1672 userinit.exe 3836 spoolsw.exe 3836 spoolsw.exe 1516 swchost.exe 1516 swchost.exe 3404 spoolsw.exe 3404 spoolsw.exe 1672 userinit.exe 1672 userinit.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3976 wrote to memory of 1672 3976 NEAS.7236baf952a8adbea6667ed066c1b4e0.exe 85 PID 3976 wrote to memory of 1672 3976 NEAS.7236baf952a8adbea6667ed066c1b4e0.exe 85 PID 3976 wrote to memory of 1672 3976 NEAS.7236baf952a8adbea6667ed066c1b4e0.exe 85 PID 1672 wrote to memory of 3836 1672 userinit.exe 86 PID 1672 wrote to memory of 3836 1672 userinit.exe 86 PID 1672 wrote to memory of 3836 1672 userinit.exe 86 PID 3836 wrote to memory of 1516 3836 spoolsw.exe 87 PID 3836 wrote to memory of 1516 3836 spoolsw.exe 87 PID 3836 wrote to memory of 1516 3836 spoolsw.exe 87 PID 1516 wrote to memory of 3404 1516 swchost.exe 88 PID 1516 wrote to memory of 3404 1516 swchost.exe 88 PID 1516 wrote to memory of 3404 1516 swchost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.7236baf952a8adbea6667ed066c1b4e0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.7236baf952a8adbea6667ed066c1b4e0.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3976 -
\??\c:\windows\userinit.exec:\windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3836 -
\??\c:\windows\swchost.exec:\windows\swchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3404
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5ecf2a36f0fb0ed4c97062d3489bdd57f
SHA17020d8bc01464cc9592b2164b89799e8f6d1bd44
SHA2564ef5b7a11d4d595e773b0ab13014b9ab69073bb6ffb42b485356826aaa10c0e5
SHA512478ca8572c94e0453f65e7f5c839b025bec224a0f404f3f6995c5f70b0373999de69e23e4715a05dc9901ad14d6d268acb0d36663a98165b669b0c37872cfd8b
-
Filesize
211KB
MD5ced6a9db60a9a41dee22808cd9987e54
SHA1f299cea4cbf97c76dec5c724ee261d017933a5a0
SHA2562dfd2472861131ee3827a71a2d5e503ceed631b27b6562dc06f0a0b8b7128db4
SHA512ab6937f8d534e042bd3df09bfde7ad693d6793174e9f7e93ab151084ae09ff09907917e4025d8539b361b8c227dc68c8edce2fab9f4c795fde23d47748cecc5e
-
Filesize
211KB
MD5ced6a9db60a9a41dee22808cd9987e54
SHA1f299cea4cbf97c76dec5c724ee261d017933a5a0
SHA2562dfd2472861131ee3827a71a2d5e503ceed631b27b6562dc06f0a0b8b7128db4
SHA512ab6937f8d534e042bd3df09bfde7ad693d6793174e9f7e93ab151084ae09ff09907917e4025d8539b361b8c227dc68c8edce2fab9f4c795fde23d47748cecc5e
-
Filesize
211KB
MD5ced6a9db60a9a41dee22808cd9987e54
SHA1f299cea4cbf97c76dec5c724ee261d017933a5a0
SHA2562dfd2472861131ee3827a71a2d5e503ceed631b27b6562dc06f0a0b8b7128db4
SHA512ab6937f8d534e042bd3df09bfde7ad693d6793174e9f7e93ab151084ae09ff09907917e4025d8539b361b8c227dc68c8edce2fab9f4c795fde23d47748cecc5e
-
Filesize
211KB
MD51e494eaefed305891b309ff7eee83bcc
SHA178aac8459fa66bb29d714a810bc80e618a151ed4
SHA256c76d78cde1b0e45e65e63d2a57575a28dceda9e5304a9df91085ea5e797800e0
SHA512098d1772b07aeb6b69a59b1f81c49c6bdc490cf7d4230366416d5c34e8bb6a42727439d7f5906ceadeedb65097e6d4a23eb0c3c7758f186931be74e12939bb51
-
Filesize
211KB
MD5f179802172e6c22216a26a2dec7afce3
SHA130c6c102a76e0217342c13c5128ac3a2f7028610
SHA256ec207f272eb1415284f36025aae3a75d9f20860c5df31c3d3e90406ee5354d66
SHA5121db4dba79e1522cf6badaf9d046c001d3b1b3ea83e61c335a867e89a04de4e40434eac53545aa6adae8f46e01d7663dc8c86e9e1377efe163307f55824d07636
-
Filesize
211KB
MD5ced6a9db60a9a41dee22808cd9987e54
SHA1f299cea4cbf97c76dec5c724ee261d017933a5a0
SHA2562dfd2472861131ee3827a71a2d5e503ceed631b27b6562dc06f0a0b8b7128db4
SHA512ab6937f8d534e042bd3df09bfde7ad693d6793174e9f7e93ab151084ae09ff09907917e4025d8539b361b8c227dc68c8edce2fab9f4c795fde23d47748cecc5e
-
Filesize
211KB
MD51e494eaefed305891b309ff7eee83bcc
SHA178aac8459fa66bb29d714a810bc80e618a151ed4
SHA256c76d78cde1b0e45e65e63d2a57575a28dceda9e5304a9df91085ea5e797800e0
SHA512098d1772b07aeb6b69a59b1f81c49c6bdc490cf7d4230366416d5c34e8bb6a42727439d7f5906ceadeedb65097e6d4a23eb0c3c7758f186931be74e12939bb51
-
Filesize
211KB
MD5f179802172e6c22216a26a2dec7afce3
SHA130c6c102a76e0217342c13c5128ac3a2f7028610
SHA256ec207f272eb1415284f36025aae3a75d9f20860c5df31c3d3e90406ee5354d66
SHA5121db4dba79e1522cf6badaf9d046c001d3b1b3ea83e61c335a867e89a04de4e40434eac53545aa6adae8f46e01d7663dc8c86e9e1377efe163307f55824d07636