Analysis

  • max time kernel
    152s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/11/2023, 08:01

General

  • Target

    NEAS.cf8c2e2e3af751573012b7c5945617f0.exe

  • Size

    135KB

  • MD5

    cf8c2e2e3af751573012b7c5945617f0

  • SHA1

    29f388dcea4bde4c30ae0cc92f38dd5b18a3baa1

  • SHA256

    625a7fe2fa3b5ad2bc4d87a987ff146a171474965fd13c9a902a30876eeff970

  • SHA512

    623c98a40b38538e6b84fd3d2eb19942ed26f94dc1325136e04a0d0dcc15d83874af64ab6b826b44656565a72a41653a006090a3680ad5ac39c0feb045b8d76e

  • SSDEEP

    1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbV1iFX:UVqoCl/YgjxEufVU0TbTyDDalP0X

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.cf8c2e2e3af751573012b7c5945617f0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.cf8c2e2e3af751573012b7c5945617f0.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4528
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2168
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1788
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1920
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:4956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    3d8d6bf72da1a21d0b3f217e8422de9f

    SHA1

    d424ee5ef6613257dfd6ff98373cd216d430903a

    SHA256

    5bb82de24f91621dfc1104f4d7d9cf25988355bed05a26c49c44fe51899d940d

    SHA512

    986935571561b032c72c3dc64c47ff382d4149cabb8cfe820b92e47d611de4407f9c08d08c49cd4c3d6668aa07c57c1aa90884f16543d56cfd1ee35e93d1b8ec

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    f805c3fa5f03521ec5651610eb5869f6

    SHA1

    53fcd8aafbffce5b9e9b98b95d25bb84c6e8a499

    SHA256

    6aa1573eade2502cc87e5d726aebd6615a273c83ad44150867613912055b1074

    SHA512

    0ca280bfb61553953ffdd74dda96c597683602860827bd8d9e085aaad89680aff39ab967ea3a15fa59c5a81b34ae4c1162b71428e7fd24b38f23b0aea1f048ae

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    f805c3fa5f03521ec5651610eb5869f6

    SHA1

    53fcd8aafbffce5b9e9b98b95d25bb84c6e8a499

    SHA256

    6aa1573eade2502cc87e5d726aebd6615a273c83ad44150867613912055b1074

    SHA512

    0ca280bfb61553953ffdd74dda96c597683602860827bd8d9e085aaad89680aff39ab967ea3a15fa59c5a81b34ae4c1162b71428e7fd24b38f23b0aea1f048ae

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    f805c3fa5f03521ec5651610eb5869f6

    SHA1

    53fcd8aafbffce5b9e9b98b95d25bb84c6e8a499

    SHA256

    6aa1573eade2502cc87e5d726aebd6615a273c83ad44150867613912055b1074

    SHA512

    0ca280bfb61553953ffdd74dda96c597683602860827bd8d9e085aaad89680aff39ab967ea3a15fa59c5a81b34ae4c1162b71428e7fd24b38f23b0aea1f048ae

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    e12f71438b805b30775592dccefff29b

    SHA1

    61b7bc1de7a0208f95d0e7c6ade9b4259443fd84

    SHA256

    54fac2a15f007efdc90e16751345b6bc01382eab71afc02d5b5e78e51835a95a

    SHA512

    44cc272fc10c0f5953480fe52b7f93869ca256625bf94f0f894b9c6ca3b574c3cb76b4209641197da5aa99f2e7836c6b15527b0321bb35a00bb7200459714f3a

  • \??\c:\windows\resources\spoolsv.exe

    Filesize

    135KB

    MD5

    f805c3fa5f03521ec5651610eb5869f6

    SHA1

    53fcd8aafbffce5b9e9b98b95d25bb84c6e8a499

    SHA256

    6aa1573eade2502cc87e5d726aebd6615a273c83ad44150867613912055b1074

    SHA512

    0ca280bfb61553953ffdd74dda96c597683602860827bd8d9e085aaad89680aff39ab967ea3a15fa59c5a81b34ae4c1162b71428e7fd24b38f23b0aea1f048ae

  • \??\c:\windows\resources\svchost.exe

    Filesize

    135KB

    MD5

    e12f71438b805b30775592dccefff29b

    SHA1

    61b7bc1de7a0208f95d0e7c6ade9b4259443fd84

    SHA256

    54fac2a15f007efdc90e16751345b6bc01382eab71afc02d5b5e78e51835a95a

    SHA512

    44cc272fc10c0f5953480fe52b7f93869ca256625bf94f0f894b9c6ca3b574c3cb76b4209641197da5aa99f2e7836c6b15527b0321bb35a00bb7200459714f3a

  • \??\c:\windows\resources\themes\explorer.exe

    Filesize

    135KB

    MD5

    3d8d6bf72da1a21d0b3f217e8422de9f

    SHA1

    d424ee5ef6613257dfd6ff98373cd216d430903a

    SHA256

    5bb82de24f91621dfc1104f4d7d9cf25988355bed05a26c49c44fe51899d940d

    SHA512

    986935571561b032c72c3dc64c47ff382d4149cabb8cfe820b92e47d611de4407f9c08d08c49cd4c3d6668aa07c57c1aa90884f16543d56cfd1ee35e93d1b8ec

  • memory/1788-34-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4528-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4528-35-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4956-29-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4956-33-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB