Analysis
-
max time kernel
152s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
12/11/2023, 08:01
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.cf8c2e2e3af751573012b7c5945617f0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.cf8c2e2e3af751573012b7c5945617f0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.cf8c2e2e3af751573012b7c5945617f0.exe
-
Size
135KB
-
MD5
cf8c2e2e3af751573012b7c5945617f0
-
SHA1
29f388dcea4bde4c30ae0cc92f38dd5b18a3baa1
-
SHA256
625a7fe2fa3b5ad2bc4d87a987ff146a171474965fd13c9a902a30876eeff970
-
SHA512
623c98a40b38538e6b84fd3d2eb19942ed26f94dc1325136e04a0d0dcc15d83874af64ab6b826b44656565a72a41653a006090a3680ad5ac39c0feb045b8d76e
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbV1iFX:UVqoCl/YgjxEufVU0TbTyDDalP0X
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2168 explorer.exe 1788 spoolsv.exe 1920 svchost.exe 4956 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe NEAS.cf8c2e2e3af751573012b7c5945617f0.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2168 explorer.exe 1920 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 2168 explorer.exe 2168 explorer.exe 1788 spoolsv.exe 1788 spoolsv.exe 1920 svchost.exe 1920 svchost.exe 4956 spoolsv.exe 4956 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4528 wrote to memory of 2168 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 92 PID 4528 wrote to memory of 2168 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 92 PID 4528 wrote to memory of 2168 4528 NEAS.cf8c2e2e3af751573012b7c5945617f0.exe 92 PID 2168 wrote to memory of 1788 2168 explorer.exe 93 PID 2168 wrote to memory of 1788 2168 explorer.exe 93 PID 2168 wrote to memory of 1788 2168 explorer.exe 93 PID 1788 wrote to memory of 1920 1788 spoolsv.exe 94 PID 1788 wrote to memory of 1920 1788 spoolsv.exe 94 PID 1788 wrote to memory of 1920 1788 spoolsv.exe 94 PID 1920 wrote to memory of 4956 1920 svchost.exe 95 PID 1920 wrote to memory of 4956 1920 svchost.exe 95 PID 1920 wrote to memory of 4956 1920 svchost.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.cf8c2e2e3af751573012b7c5945617f0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.cf8c2e2e3af751573012b7c5945617f0.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4528 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1788 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4956
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD53d8d6bf72da1a21d0b3f217e8422de9f
SHA1d424ee5ef6613257dfd6ff98373cd216d430903a
SHA2565bb82de24f91621dfc1104f4d7d9cf25988355bed05a26c49c44fe51899d940d
SHA512986935571561b032c72c3dc64c47ff382d4149cabb8cfe820b92e47d611de4407f9c08d08c49cd4c3d6668aa07c57c1aa90884f16543d56cfd1ee35e93d1b8ec
-
Filesize
135KB
MD5f805c3fa5f03521ec5651610eb5869f6
SHA153fcd8aafbffce5b9e9b98b95d25bb84c6e8a499
SHA2566aa1573eade2502cc87e5d726aebd6615a273c83ad44150867613912055b1074
SHA5120ca280bfb61553953ffdd74dda96c597683602860827bd8d9e085aaad89680aff39ab967ea3a15fa59c5a81b34ae4c1162b71428e7fd24b38f23b0aea1f048ae
-
Filesize
135KB
MD5f805c3fa5f03521ec5651610eb5869f6
SHA153fcd8aafbffce5b9e9b98b95d25bb84c6e8a499
SHA2566aa1573eade2502cc87e5d726aebd6615a273c83ad44150867613912055b1074
SHA5120ca280bfb61553953ffdd74dda96c597683602860827bd8d9e085aaad89680aff39ab967ea3a15fa59c5a81b34ae4c1162b71428e7fd24b38f23b0aea1f048ae
-
Filesize
135KB
MD5f805c3fa5f03521ec5651610eb5869f6
SHA153fcd8aafbffce5b9e9b98b95d25bb84c6e8a499
SHA2566aa1573eade2502cc87e5d726aebd6615a273c83ad44150867613912055b1074
SHA5120ca280bfb61553953ffdd74dda96c597683602860827bd8d9e085aaad89680aff39ab967ea3a15fa59c5a81b34ae4c1162b71428e7fd24b38f23b0aea1f048ae
-
Filesize
135KB
MD5e12f71438b805b30775592dccefff29b
SHA161b7bc1de7a0208f95d0e7c6ade9b4259443fd84
SHA25654fac2a15f007efdc90e16751345b6bc01382eab71afc02d5b5e78e51835a95a
SHA51244cc272fc10c0f5953480fe52b7f93869ca256625bf94f0f894b9c6ca3b574c3cb76b4209641197da5aa99f2e7836c6b15527b0321bb35a00bb7200459714f3a
-
Filesize
135KB
MD5f805c3fa5f03521ec5651610eb5869f6
SHA153fcd8aafbffce5b9e9b98b95d25bb84c6e8a499
SHA2566aa1573eade2502cc87e5d726aebd6615a273c83ad44150867613912055b1074
SHA5120ca280bfb61553953ffdd74dda96c597683602860827bd8d9e085aaad89680aff39ab967ea3a15fa59c5a81b34ae4c1162b71428e7fd24b38f23b0aea1f048ae
-
Filesize
135KB
MD5e12f71438b805b30775592dccefff29b
SHA161b7bc1de7a0208f95d0e7c6ade9b4259443fd84
SHA25654fac2a15f007efdc90e16751345b6bc01382eab71afc02d5b5e78e51835a95a
SHA51244cc272fc10c0f5953480fe52b7f93869ca256625bf94f0f894b9c6ca3b574c3cb76b4209641197da5aa99f2e7836c6b15527b0321bb35a00bb7200459714f3a
-
Filesize
135KB
MD53d8d6bf72da1a21d0b3f217e8422de9f
SHA1d424ee5ef6613257dfd6ff98373cd216d430903a
SHA2565bb82de24f91621dfc1104f4d7d9cf25988355bed05a26c49c44fe51899d940d
SHA512986935571561b032c72c3dc64c47ff382d4149cabb8cfe820b92e47d611de4407f9c08d08c49cd4c3d6668aa07c57c1aa90884f16543d56cfd1ee35e93d1b8ec