Analysis
-
max time kernel
210s -
max time network
230s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2023 23:23
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.4124ecb309aecaad72e04ee68d48b300.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.4124ecb309aecaad72e04ee68d48b300.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.4124ecb309aecaad72e04ee68d48b300.exe
-
Size
135KB
-
MD5
4124ecb309aecaad72e04ee68d48b300
-
SHA1
eeead9c39a8cc09b107fdd3159867fe71c0d3233
-
SHA256
6855231b153d3ca40a5981c0ddce3845bf2896efbe59e2f762f786acc7cd9fe0
-
SHA512
a8cc34968b3280e9b1ea75a055bb26a25cc0dab69951a40086ecf70da055dcb0f97012ff230cc38b0ac0fc4aa816d288ade18eca1beeb68996a8ca1d616cee33
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbV89:UVqoCl/YgjxEufVU0TbTyDDalS9
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4092 explorer.exe 1908 spoolsv.exe 4792 svchost.exe 3392 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe NEAS.4124ecb309aecaad72e04ee68d48b300.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe 4092 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4092 explorer.exe 4792 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 4092 explorer.exe 4092 explorer.exe 1908 spoolsv.exe 1908 spoolsv.exe 4792 svchost.exe 4792 svchost.exe 3392 spoolsv.exe 3392 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4496 wrote to memory of 4092 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 90 PID 4496 wrote to memory of 4092 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 90 PID 4496 wrote to memory of 4092 4496 NEAS.4124ecb309aecaad72e04ee68d48b300.exe 90 PID 4092 wrote to memory of 1908 4092 explorer.exe 92 PID 4092 wrote to memory of 1908 4092 explorer.exe 92 PID 4092 wrote to memory of 1908 4092 explorer.exe 92 PID 1908 wrote to memory of 4792 1908 spoolsv.exe 93 PID 1908 wrote to memory of 4792 1908 spoolsv.exe 93 PID 1908 wrote to memory of 4792 1908 spoolsv.exe 93 PID 4792 wrote to memory of 3392 4792 svchost.exe 95 PID 4792 wrote to memory of 3392 4792 svchost.exe 95 PID 4792 wrote to memory of 3392 4792 svchost.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.4124ecb309aecaad72e04ee68d48b300.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.4124ecb309aecaad72e04ee68d48b300.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4496 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4092 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4792 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3392
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5f11d5d9de23c03471fc6902783e10a9e
SHA1aa514ec1afe419ffa8090ff784fe881013f5a6d0
SHA25653bbad316dd72ddc45a530b44956a476da8382e223a21a1d52791ee6a6b55089
SHA5121dae9c87bf45607b26ee36722a8b7721bea5191a9ca3592beef01d1c8c52e5575abef8a3f6a1ac43da64526f5ef5f5187f27d8d16f3c117e8ad4232d30e8bd2d
-
Filesize
135KB
MD50fa994dff3f09b5de0465f1176b90da0
SHA1cc0707e654642641895223f1f43bc93e662f1c5d
SHA25665c99182ad8fc4ef016b033274dd11764be2d323bba40371d674188c526f575d
SHA51227c0da323d7b310baaa977068771756375a5ef000d9ca7f2de45dec5b792ff8e3326e1f4892ddad0a08d6f89e19c741652524492865c8f7e3eda282d98f60d11
-
Filesize
135KB
MD50fa994dff3f09b5de0465f1176b90da0
SHA1cc0707e654642641895223f1f43bc93e662f1c5d
SHA25665c99182ad8fc4ef016b033274dd11764be2d323bba40371d674188c526f575d
SHA51227c0da323d7b310baaa977068771756375a5ef000d9ca7f2de45dec5b792ff8e3326e1f4892ddad0a08d6f89e19c741652524492865c8f7e3eda282d98f60d11
-
Filesize
135KB
MD50fa994dff3f09b5de0465f1176b90da0
SHA1cc0707e654642641895223f1f43bc93e662f1c5d
SHA25665c99182ad8fc4ef016b033274dd11764be2d323bba40371d674188c526f575d
SHA51227c0da323d7b310baaa977068771756375a5ef000d9ca7f2de45dec5b792ff8e3326e1f4892ddad0a08d6f89e19c741652524492865c8f7e3eda282d98f60d11
-
Filesize
135KB
MD5186c77311f345553db2f2059cba47127
SHA16268451650c09673e96945eef705a1b08eaef10a
SHA256cad4bfa889f118d6e0295cce7b631839d78cf9dc8bf16c9ea013761b3db3954e
SHA5129b3d5bdfe41a8692d9740efbb741fbef6d8abf69fdeeb8c35d4b2e87f7325e87faeed7fa0a0ba5ec0cb0cb42ae4b6445552e40bcdbfdb35cdce2b3916a0f686a
-
Filesize
135KB
MD50fa994dff3f09b5de0465f1176b90da0
SHA1cc0707e654642641895223f1f43bc93e662f1c5d
SHA25665c99182ad8fc4ef016b033274dd11764be2d323bba40371d674188c526f575d
SHA51227c0da323d7b310baaa977068771756375a5ef000d9ca7f2de45dec5b792ff8e3326e1f4892ddad0a08d6f89e19c741652524492865c8f7e3eda282d98f60d11
-
Filesize
135KB
MD5186c77311f345553db2f2059cba47127
SHA16268451650c09673e96945eef705a1b08eaef10a
SHA256cad4bfa889f118d6e0295cce7b631839d78cf9dc8bf16c9ea013761b3db3954e
SHA5129b3d5bdfe41a8692d9740efbb741fbef6d8abf69fdeeb8c35d4b2e87f7325e87faeed7fa0a0ba5ec0cb0cb42ae4b6445552e40bcdbfdb35cdce2b3916a0f686a
-
Filesize
135KB
MD5f11d5d9de23c03471fc6902783e10a9e
SHA1aa514ec1afe419ffa8090ff784fe881013f5a6d0
SHA25653bbad316dd72ddc45a530b44956a476da8382e223a21a1d52791ee6a6b55089
SHA5121dae9c87bf45607b26ee36722a8b7721bea5191a9ca3592beef01d1c8c52e5575abef8a3f6a1ac43da64526f5ef5f5187f27d8d16f3c117e8ad4232d30e8bd2d