Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    12/11/2023, 23:53

General

  • Target

    NEAS.0a7f1961580e17dc98dcbc6151782030.exe

  • Size

    206KB

  • MD5

    0a7f1961580e17dc98dcbc6151782030

  • SHA1

    ab17b676e03cfab1dff0e246c6ed59982cf53891

  • SHA256

    cbfd7c0489cd666532a60056af9a4b897028872f6dde723e20ef2f3d40e358eb

  • SHA512

    3d9bcdc72e91a88fbc89f3b8f458101525e759033a7c430fd3114e7fd9ed9476875832e0c4d1f6551dcf44ef4650cc034f57e6816cbcab7a8cca820efb8de5e3

  • SSDEEP

    3072:zvEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6un4:zvEN2U+T6i5LirrllHy4HUcMQY6B

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.0a7f1961580e17dc98dcbc6151782030.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.0a7f1961580e17dc98dcbc6151782030.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2420
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2440
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2600
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2660
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2772
          • C:\Windows\SysWOW64\at.exe
            at 23:55 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:2484
            • C:\Windows\SysWOW64\at.exe
              at 23:56 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:2040
              • C:\Windows\SysWOW64\at.exe
                at 23:57 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:2860

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          206KB

          MD5

          5e2afdc3c147d0cb72e5b3be8e151944

          SHA1

          e95a8084a8ea6c10169645816081556d9f6b895b

          SHA256

          d82112e76a5f262f4babd233c2e82ab3dce0b1b8382557e8a89e766795029cce

          SHA512

          f85a4ed393b6b7575868ff947e4e4afe708dbf499d81bfb99922fd77d5b422ecef7dd00c44cbb4c9c62357091330a7d9e01fa8fe7d5fd68da1919d38515d123c

        • C:\Windows\system\explorer.exe

          Filesize

          206KB

          MD5

          18b17330f4f0548fa1db36b6f429c8fe

          SHA1

          7fd6e23f720bcc3a125d34ee68a2c57c5cc6e4db

          SHA256

          caf7b37284a09ed8e3467d887a006a47bdeafb500d9fe46e142262e24a9f7e97

          SHA512

          88caa424562156c0590d436b82cffc31e0e47239c76bbcc4a5ccca2f6f5b845fa9c7d90415b202d38c0f833ec95e5668dbfba6cb63256b2a1b7f8ea82669bc7d

        • C:\Windows\system\explorer.exe

          Filesize

          206KB

          MD5

          18b17330f4f0548fa1db36b6f429c8fe

          SHA1

          7fd6e23f720bcc3a125d34ee68a2c57c5cc6e4db

          SHA256

          caf7b37284a09ed8e3467d887a006a47bdeafb500d9fe46e142262e24a9f7e97

          SHA512

          88caa424562156c0590d436b82cffc31e0e47239c76bbcc4a5ccca2f6f5b845fa9c7d90415b202d38c0f833ec95e5668dbfba6cb63256b2a1b7f8ea82669bc7d

        • C:\Windows\system\spoolsv.exe

          Filesize

          206KB

          MD5

          df1d9520c8f3cf0284280492589aae73

          SHA1

          c9afb8f5fd0bea0689a23e4865a9b70d51c5177a

          SHA256

          a3282d92a497cfb0842677847559f8056e3f0a20e2d68ae5d36a616bb6ecdc7a

          SHA512

          09bcbcc52374d4545a012b335519be4a037ae86b9dc168847eaff900d7b81af4e41432172e033ccd9ed2228ad648c52ff6cbd46350de2aec7c364fd3f5be1594

        • C:\Windows\system\spoolsv.exe

          Filesize

          206KB

          MD5

          df1d9520c8f3cf0284280492589aae73

          SHA1

          c9afb8f5fd0bea0689a23e4865a9b70d51c5177a

          SHA256

          a3282d92a497cfb0842677847559f8056e3f0a20e2d68ae5d36a616bb6ecdc7a

          SHA512

          09bcbcc52374d4545a012b335519be4a037ae86b9dc168847eaff900d7b81af4e41432172e033ccd9ed2228ad648c52ff6cbd46350de2aec7c364fd3f5be1594

        • C:\Windows\system\svchost.exe

          Filesize

          206KB

          MD5

          124a8144697d44299efb0a8d54b95188

          SHA1

          abc61e614c98fee57f4a15d24c5e4a543e75adbc

          SHA256

          fddb9edba49658e5cab7da8684e3b3055810fa5b748213b2cf2ff678d5eb8eda

          SHA512

          4c82c133c1bc0acc9cc2781392f492220e05de6a7eb3cd181ffe6f177d81b92b665cb0a46fb8ed98f180d3b29a5093e8d9a0f2a381d75e58a13631b00a7ade2a

        • \??\c:\windows\system\explorer.exe

          Filesize

          206KB

          MD5

          18b17330f4f0548fa1db36b6f429c8fe

          SHA1

          7fd6e23f720bcc3a125d34ee68a2c57c5cc6e4db

          SHA256

          caf7b37284a09ed8e3467d887a006a47bdeafb500d9fe46e142262e24a9f7e97

          SHA512

          88caa424562156c0590d436b82cffc31e0e47239c76bbcc4a5ccca2f6f5b845fa9c7d90415b202d38c0f833ec95e5668dbfba6cb63256b2a1b7f8ea82669bc7d

        • \??\c:\windows\system\spoolsv.exe

          Filesize

          206KB

          MD5

          df1d9520c8f3cf0284280492589aae73

          SHA1

          c9afb8f5fd0bea0689a23e4865a9b70d51c5177a

          SHA256

          a3282d92a497cfb0842677847559f8056e3f0a20e2d68ae5d36a616bb6ecdc7a

          SHA512

          09bcbcc52374d4545a012b335519be4a037ae86b9dc168847eaff900d7b81af4e41432172e033ccd9ed2228ad648c52ff6cbd46350de2aec7c364fd3f5be1594

        • \??\c:\windows\system\svchost.exe

          Filesize

          206KB

          MD5

          124a8144697d44299efb0a8d54b95188

          SHA1

          abc61e614c98fee57f4a15d24c5e4a543e75adbc

          SHA256

          fddb9edba49658e5cab7da8684e3b3055810fa5b748213b2cf2ff678d5eb8eda

          SHA512

          4c82c133c1bc0acc9cc2781392f492220e05de6a7eb3cd181ffe6f177d81b92b665cb0a46fb8ed98f180d3b29a5093e8d9a0f2a381d75e58a13631b00a7ade2a

        • \Windows\system\explorer.exe

          Filesize

          206KB

          MD5

          18b17330f4f0548fa1db36b6f429c8fe

          SHA1

          7fd6e23f720bcc3a125d34ee68a2c57c5cc6e4db

          SHA256

          caf7b37284a09ed8e3467d887a006a47bdeafb500d9fe46e142262e24a9f7e97

          SHA512

          88caa424562156c0590d436b82cffc31e0e47239c76bbcc4a5ccca2f6f5b845fa9c7d90415b202d38c0f833ec95e5668dbfba6cb63256b2a1b7f8ea82669bc7d

        • \Windows\system\explorer.exe

          Filesize

          206KB

          MD5

          18b17330f4f0548fa1db36b6f429c8fe

          SHA1

          7fd6e23f720bcc3a125d34ee68a2c57c5cc6e4db

          SHA256

          caf7b37284a09ed8e3467d887a006a47bdeafb500d9fe46e142262e24a9f7e97

          SHA512

          88caa424562156c0590d436b82cffc31e0e47239c76bbcc4a5ccca2f6f5b845fa9c7d90415b202d38c0f833ec95e5668dbfba6cb63256b2a1b7f8ea82669bc7d

        • \Windows\system\spoolsv.exe

          Filesize

          206KB

          MD5

          df1d9520c8f3cf0284280492589aae73

          SHA1

          c9afb8f5fd0bea0689a23e4865a9b70d51c5177a

          SHA256

          a3282d92a497cfb0842677847559f8056e3f0a20e2d68ae5d36a616bb6ecdc7a

          SHA512

          09bcbcc52374d4545a012b335519be4a037ae86b9dc168847eaff900d7b81af4e41432172e033ccd9ed2228ad648c52ff6cbd46350de2aec7c364fd3f5be1594

        • \Windows\system\spoolsv.exe

          Filesize

          206KB

          MD5

          df1d9520c8f3cf0284280492589aae73

          SHA1

          c9afb8f5fd0bea0689a23e4865a9b70d51c5177a

          SHA256

          a3282d92a497cfb0842677847559f8056e3f0a20e2d68ae5d36a616bb6ecdc7a

          SHA512

          09bcbcc52374d4545a012b335519be4a037ae86b9dc168847eaff900d7b81af4e41432172e033ccd9ed2228ad648c52ff6cbd46350de2aec7c364fd3f5be1594

        • \Windows\system\spoolsv.exe

          Filesize

          206KB

          MD5

          df1d9520c8f3cf0284280492589aae73

          SHA1

          c9afb8f5fd0bea0689a23e4865a9b70d51c5177a

          SHA256

          a3282d92a497cfb0842677847559f8056e3f0a20e2d68ae5d36a616bb6ecdc7a

          SHA512

          09bcbcc52374d4545a012b335519be4a037ae86b9dc168847eaff900d7b81af4e41432172e033ccd9ed2228ad648c52ff6cbd46350de2aec7c364fd3f5be1594

        • \Windows\system\spoolsv.exe

          Filesize

          206KB

          MD5

          df1d9520c8f3cf0284280492589aae73

          SHA1

          c9afb8f5fd0bea0689a23e4865a9b70d51c5177a

          SHA256

          a3282d92a497cfb0842677847559f8056e3f0a20e2d68ae5d36a616bb6ecdc7a

          SHA512

          09bcbcc52374d4545a012b335519be4a037ae86b9dc168847eaff900d7b81af4e41432172e033ccd9ed2228ad648c52ff6cbd46350de2aec7c364fd3f5be1594

        • \Windows\system\svchost.exe

          Filesize

          206KB

          MD5

          124a8144697d44299efb0a8d54b95188

          SHA1

          abc61e614c98fee57f4a15d24c5e4a543e75adbc

          SHA256

          fddb9edba49658e5cab7da8684e3b3055810fa5b748213b2cf2ff678d5eb8eda

          SHA512

          4c82c133c1bc0acc9cc2781392f492220e05de6a7eb3cd181ffe6f177d81b92b665cb0a46fb8ed98f180d3b29a5093e8d9a0f2a381d75e58a13631b00a7ade2a

        • \Windows\system\svchost.exe

          Filesize

          206KB

          MD5

          124a8144697d44299efb0a8d54b95188

          SHA1

          abc61e614c98fee57f4a15d24c5e4a543e75adbc

          SHA256

          fddb9edba49658e5cab7da8684e3b3055810fa5b748213b2cf2ff678d5eb8eda

          SHA512

          4c82c133c1bc0acc9cc2781392f492220e05de6a7eb3cd181ffe6f177d81b92b665cb0a46fb8ed98f180d3b29a5093e8d9a0f2a381d75e58a13631b00a7ade2a