Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
12/11/2023, 23:53
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0a7f1961580e17dc98dcbc6151782030.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.0a7f1961580e17dc98dcbc6151782030.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.0a7f1961580e17dc98dcbc6151782030.exe
-
Size
206KB
-
MD5
0a7f1961580e17dc98dcbc6151782030
-
SHA1
ab17b676e03cfab1dff0e246c6ed59982cf53891
-
SHA256
cbfd7c0489cd666532a60056af9a4b897028872f6dde723e20ef2f3d40e358eb
-
SHA512
3d9bcdc72e91a88fbc89f3b8f458101525e759033a7c430fd3114e7fd9ed9476875832e0c4d1f6551dcf44ef4650cc034f57e6816cbcab7a8cca820efb8de5e3
-
SSDEEP
3072:zvEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6un4:zvEN2U+T6i5LirrllHy4HUcMQY6B
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2440 explorer.exe 2600 spoolsv.exe 2660 svchost.exe 2772 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2420 NEAS.0a7f1961580e17dc98dcbc6151782030.exe 2420 NEAS.0a7f1961580e17dc98dcbc6151782030.exe 2440 explorer.exe 2440 explorer.exe 2600 spoolsv.exe 2600 spoolsv.exe 2660 svchost.exe 2660 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe NEAS.0a7f1961580e17dc98dcbc6151782030.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2420 NEAS.0a7f1961580e17dc98dcbc6151782030.exe 2440 explorer.exe 2440 explorer.exe 2440 explorer.exe 2440 explorer.exe 2660 svchost.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe 2660 svchost.exe 2440 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2440 explorer.exe 2660 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2420 NEAS.0a7f1961580e17dc98dcbc6151782030.exe 2420 NEAS.0a7f1961580e17dc98dcbc6151782030.exe 2440 explorer.exe 2440 explorer.exe 2600 spoolsv.exe 2600 spoolsv.exe 2660 svchost.exe 2660 svchost.exe 2772 spoolsv.exe 2772 spoolsv.exe 2440 explorer.exe 2440 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2440 2420 NEAS.0a7f1961580e17dc98dcbc6151782030.exe 28 PID 2420 wrote to memory of 2440 2420 NEAS.0a7f1961580e17dc98dcbc6151782030.exe 28 PID 2420 wrote to memory of 2440 2420 NEAS.0a7f1961580e17dc98dcbc6151782030.exe 28 PID 2420 wrote to memory of 2440 2420 NEAS.0a7f1961580e17dc98dcbc6151782030.exe 28 PID 2440 wrote to memory of 2600 2440 explorer.exe 29 PID 2440 wrote to memory of 2600 2440 explorer.exe 29 PID 2440 wrote to memory of 2600 2440 explorer.exe 29 PID 2440 wrote to memory of 2600 2440 explorer.exe 29 PID 2600 wrote to memory of 2660 2600 spoolsv.exe 30 PID 2600 wrote to memory of 2660 2600 spoolsv.exe 30 PID 2600 wrote to memory of 2660 2600 spoolsv.exe 30 PID 2600 wrote to memory of 2660 2600 spoolsv.exe 30 PID 2660 wrote to memory of 2772 2660 svchost.exe 31 PID 2660 wrote to memory of 2772 2660 svchost.exe 31 PID 2660 wrote to memory of 2772 2660 svchost.exe 31 PID 2660 wrote to memory of 2772 2660 svchost.exe 31 PID 2660 wrote to memory of 2484 2660 svchost.exe 32 PID 2660 wrote to memory of 2484 2660 svchost.exe 32 PID 2660 wrote to memory of 2484 2660 svchost.exe 32 PID 2660 wrote to memory of 2484 2660 svchost.exe 32 PID 2660 wrote to memory of 2040 2660 svchost.exe 37 PID 2660 wrote to memory of 2040 2660 svchost.exe 37 PID 2660 wrote to memory of 2040 2660 svchost.exe 37 PID 2660 wrote to memory of 2040 2660 svchost.exe 37 PID 2660 wrote to memory of 2860 2660 svchost.exe 38 PID 2660 wrote to memory of 2860 2660 svchost.exe 38 PID 2660 wrote to memory of 2860 2660 svchost.exe 38 PID 2660 wrote to memory of 2860 2660 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.0a7f1961580e17dc98dcbc6151782030.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.0a7f1961580e17dc98dcbc6151782030.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2772
-
-
C:\Windows\SysWOW64\at.exeat 23:55 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2484
-
-
C:\Windows\SysWOW64\at.exeat 23:56 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2040
-
-
C:\Windows\SysWOW64\at.exeat 23:57 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2860
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD55e2afdc3c147d0cb72e5b3be8e151944
SHA1e95a8084a8ea6c10169645816081556d9f6b895b
SHA256d82112e76a5f262f4babd233c2e82ab3dce0b1b8382557e8a89e766795029cce
SHA512f85a4ed393b6b7575868ff947e4e4afe708dbf499d81bfb99922fd77d5b422ecef7dd00c44cbb4c9c62357091330a7d9e01fa8fe7d5fd68da1919d38515d123c
-
Filesize
206KB
MD518b17330f4f0548fa1db36b6f429c8fe
SHA17fd6e23f720bcc3a125d34ee68a2c57c5cc6e4db
SHA256caf7b37284a09ed8e3467d887a006a47bdeafb500d9fe46e142262e24a9f7e97
SHA51288caa424562156c0590d436b82cffc31e0e47239c76bbcc4a5ccca2f6f5b845fa9c7d90415b202d38c0f833ec95e5668dbfba6cb63256b2a1b7f8ea82669bc7d
-
Filesize
206KB
MD518b17330f4f0548fa1db36b6f429c8fe
SHA17fd6e23f720bcc3a125d34ee68a2c57c5cc6e4db
SHA256caf7b37284a09ed8e3467d887a006a47bdeafb500d9fe46e142262e24a9f7e97
SHA51288caa424562156c0590d436b82cffc31e0e47239c76bbcc4a5ccca2f6f5b845fa9c7d90415b202d38c0f833ec95e5668dbfba6cb63256b2a1b7f8ea82669bc7d
-
Filesize
206KB
MD5df1d9520c8f3cf0284280492589aae73
SHA1c9afb8f5fd0bea0689a23e4865a9b70d51c5177a
SHA256a3282d92a497cfb0842677847559f8056e3f0a20e2d68ae5d36a616bb6ecdc7a
SHA51209bcbcc52374d4545a012b335519be4a037ae86b9dc168847eaff900d7b81af4e41432172e033ccd9ed2228ad648c52ff6cbd46350de2aec7c364fd3f5be1594
-
Filesize
206KB
MD5df1d9520c8f3cf0284280492589aae73
SHA1c9afb8f5fd0bea0689a23e4865a9b70d51c5177a
SHA256a3282d92a497cfb0842677847559f8056e3f0a20e2d68ae5d36a616bb6ecdc7a
SHA51209bcbcc52374d4545a012b335519be4a037ae86b9dc168847eaff900d7b81af4e41432172e033ccd9ed2228ad648c52ff6cbd46350de2aec7c364fd3f5be1594
-
Filesize
206KB
MD5124a8144697d44299efb0a8d54b95188
SHA1abc61e614c98fee57f4a15d24c5e4a543e75adbc
SHA256fddb9edba49658e5cab7da8684e3b3055810fa5b748213b2cf2ff678d5eb8eda
SHA5124c82c133c1bc0acc9cc2781392f492220e05de6a7eb3cd181ffe6f177d81b92b665cb0a46fb8ed98f180d3b29a5093e8d9a0f2a381d75e58a13631b00a7ade2a
-
Filesize
206KB
MD518b17330f4f0548fa1db36b6f429c8fe
SHA17fd6e23f720bcc3a125d34ee68a2c57c5cc6e4db
SHA256caf7b37284a09ed8e3467d887a006a47bdeafb500d9fe46e142262e24a9f7e97
SHA51288caa424562156c0590d436b82cffc31e0e47239c76bbcc4a5ccca2f6f5b845fa9c7d90415b202d38c0f833ec95e5668dbfba6cb63256b2a1b7f8ea82669bc7d
-
Filesize
206KB
MD5df1d9520c8f3cf0284280492589aae73
SHA1c9afb8f5fd0bea0689a23e4865a9b70d51c5177a
SHA256a3282d92a497cfb0842677847559f8056e3f0a20e2d68ae5d36a616bb6ecdc7a
SHA51209bcbcc52374d4545a012b335519be4a037ae86b9dc168847eaff900d7b81af4e41432172e033ccd9ed2228ad648c52ff6cbd46350de2aec7c364fd3f5be1594
-
Filesize
206KB
MD5124a8144697d44299efb0a8d54b95188
SHA1abc61e614c98fee57f4a15d24c5e4a543e75adbc
SHA256fddb9edba49658e5cab7da8684e3b3055810fa5b748213b2cf2ff678d5eb8eda
SHA5124c82c133c1bc0acc9cc2781392f492220e05de6a7eb3cd181ffe6f177d81b92b665cb0a46fb8ed98f180d3b29a5093e8d9a0f2a381d75e58a13631b00a7ade2a
-
Filesize
206KB
MD518b17330f4f0548fa1db36b6f429c8fe
SHA17fd6e23f720bcc3a125d34ee68a2c57c5cc6e4db
SHA256caf7b37284a09ed8e3467d887a006a47bdeafb500d9fe46e142262e24a9f7e97
SHA51288caa424562156c0590d436b82cffc31e0e47239c76bbcc4a5ccca2f6f5b845fa9c7d90415b202d38c0f833ec95e5668dbfba6cb63256b2a1b7f8ea82669bc7d
-
Filesize
206KB
MD518b17330f4f0548fa1db36b6f429c8fe
SHA17fd6e23f720bcc3a125d34ee68a2c57c5cc6e4db
SHA256caf7b37284a09ed8e3467d887a006a47bdeafb500d9fe46e142262e24a9f7e97
SHA51288caa424562156c0590d436b82cffc31e0e47239c76bbcc4a5ccca2f6f5b845fa9c7d90415b202d38c0f833ec95e5668dbfba6cb63256b2a1b7f8ea82669bc7d
-
Filesize
206KB
MD5df1d9520c8f3cf0284280492589aae73
SHA1c9afb8f5fd0bea0689a23e4865a9b70d51c5177a
SHA256a3282d92a497cfb0842677847559f8056e3f0a20e2d68ae5d36a616bb6ecdc7a
SHA51209bcbcc52374d4545a012b335519be4a037ae86b9dc168847eaff900d7b81af4e41432172e033ccd9ed2228ad648c52ff6cbd46350de2aec7c364fd3f5be1594
-
Filesize
206KB
MD5df1d9520c8f3cf0284280492589aae73
SHA1c9afb8f5fd0bea0689a23e4865a9b70d51c5177a
SHA256a3282d92a497cfb0842677847559f8056e3f0a20e2d68ae5d36a616bb6ecdc7a
SHA51209bcbcc52374d4545a012b335519be4a037ae86b9dc168847eaff900d7b81af4e41432172e033ccd9ed2228ad648c52ff6cbd46350de2aec7c364fd3f5be1594
-
Filesize
206KB
MD5df1d9520c8f3cf0284280492589aae73
SHA1c9afb8f5fd0bea0689a23e4865a9b70d51c5177a
SHA256a3282d92a497cfb0842677847559f8056e3f0a20e2d68ae5d36a616bb6ecdc7a
SHA51209bcbcc52374d4545a012b335519be4a037ae86b9dc168847eaff900d7b81af4e41432172e033ccd9ed2228ad648c52ff6cbd46350de2aec7c364fd3f5be1594
-
Filesize
206KB
MD5df1d9520c8f3cf0284280492589aae73
SHA1c9afb8f5fd0bea0689a23e4865a9b70d51c5177a
SHA256a3282d92a497cfb0842677847559f8056e3f0a20e2d68ae5d36a616bb6ecdc7a
SHA51209bcbcc52374d4545a012b335519be4a037ae86b9dc168847eaff900d7b81af4e41432172e033ccd9ed2228ad648c52ff6cbd46350de2aec7c364fd3f5be1594
-
Filesize
206KB
MD5124a8144697d44299efb0a8d54b95188
SHA1abc61e614c98fee57f4a15d24c5e4a543e75adbc
SHA256fddb9edba49658e5cab7da8684e3b3055810fa5b748213b2cf2ff678d5eb8eda
SHA5124c82c133c1bc0acc9cc2781392f492220e05de6a7eb3cd181ffe6f177d81b92b665cb0a46fb8ed98f180d3b29a5093e8d9a0f2a381d75e58a13631b00a7ade2a
-
Filesize
206KB
MD5124a8144697d44299efb0a8d54b95188
SHA1abc61e614c98fee57f4a15d24c5e4a543e75adbc
SHA256fddb9edba49658e5cab7da8684e3b3055810fa5b748213b2cf2ff678d5eb8eda
SHA5124c82c133c1bc0acc9cc2781392f492220e05de6a7eb3cd181ffe6f177d81b92b665cb0a46fb8ed98f180d3b29a5093e8d9a0f2a381d75e58a13631b00a7ade2a