Analysis
-
max time kernel
155s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2023 09:41
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.02b70a97c3c0b99ccf84ab7ffe3be600.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.02b70a97c3c0b99ccf84ab7ffe3be600.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.02b70a97c3c0b99ccf84ab7ffe3be600.exe
-
Size
293KB
-
MD5
02b70a97c3c0b99ccf84ab7ffe3be600
-
SHA1
d93886c2b4a2901be15c0469c8ad4adb4c3d53e6
-
SHA256
b525eb7207acc2739513e6996df64c569151be26ea3e4dfaa73c2df4c215d311
-
SHA512
8fff2c644f0c8caa3863d17e5c9c6cf0c50463b6a47796660bf8bbdda03e273500af6babe7bdae39637ae704149b4bd4be0b28321b3bc31f0d75e73a731d8862
-
SSDEEP
3072:AygCullUQN7gsBh1L1QygCullUQN7gsBh1L12:ARleK7712RleK771o
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 680 explorer.exe 4952 spoolsv.exe 3708 svchost.exe 4204 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe NEAS.02b70a97c3c0b99ccf84ab7ffe3be600.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\System\tjud.exe explorer.exe File opened for modification C:\Windows\System\tjcm.cmn explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2828 NEAS.02b70a97c3c0b99ccf84ab7ffe3be600.exe 2828 NEAS.02b70a97c3c0b99ccf84ab7ffe3be600.exe 680 explorer.exe 680 explorer.exe 680 explorer.exe 680 explorer.exe 680 explorer.exe 680 explorer.exe 680 explorer.exe 680 explorer.exe 3708 svchost.exe 3708 svchost.exe 3708 svchost.exe 3708 svchost.exe 680 explorer.exe 680 explorer.exe 3708 svchost.exe 3708 svchost.exe 680 explorer.exe 680 explorer.exe 3708 svchost.exe 3708 svchost.exe 680 explorer.exe 680 explorer.exe 3708 svchost.exe 3708 svchost.exe 680 explorer.exe 680 explorer.exe 3708 svchost.exe 3708 svchost.exe 680 explorer.exe 680 explorer.exe 3708 svchost.exe 3708 svchost.exe 680 explorer.exe 680 explorer.exe 3708 svchost.exe 3708 svchost.exe 680 explorer.exe 680 explorer.exe 3708 svchost.exe 3708 svchost.exe 680 explorer.exe 680 explorer.exe 3708 svchost.exe 3708 svchost.exe 680 explorer.exe 680 explorer.exe 3708 svchost.exe 3708 svchost.exe 680 explorer.exe 680 explorer.exe 3708 svchost.exe 3708 svchost.exe 680 explorer.exe 680 explorer.exe 3708 svchost.exe 3708 svchost.exe 680 explorer.exe 680 explorer.exe 3708 svchost.exe 3708 svchost.exe 680 explorer.exe 680 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 680 explorer.exe 3708 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2828 NEAS.02b70a97c3c0b99ccf84ab7ffe3be600.exe 2828 NEAS.02b70a97c3c0b99ccf84ab7ffe3be600.exe 680 explorer.exe 680 explorer.exe 4952 spoolsv.exe 4952 spoolsv.exe 3708 svchost.exe 3708 svchost.exe 4204 spoolsv.exe 4204 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2828 wrote to memory of 680 2828 NEAS.02b70a97c3c0b99ccf84ab7ffe3be600.exe 86 PID 2828 wrote to memory of 680 2828 NEAS.02b70a97c3c0b99ccf84ab7ffe3be600.exe 86 PID 2828 wrote to memory of 680 2828 NEAS.02b70a97c3c0b99ccf84ab7ffe3be600.exe 86 PID 680 wrote to memory of 4952 680 explorer.exe 87 PID 680 wrote to memory of 4952 680 explorer.exe 87 PID 680 wrote to memory of 4952 680 explorer.exe 87 PID 4952 wrote to memory of 3708 4952 spoolsv.exe 89 PID 4952 wrote to memory of 3708 4952 spoolsv.exe 89 PID 4952 wrote to memory of 3708 4952 spoolsv.exe 89 PID 3708 wrote to memory of 4204 3708 svchost.exe 90 PID 3708 wrote to memory of 4204 3708 svchost.exe 90 PID 3708 wrote to memory of 4204 3708 svchost.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.02b70a97c3c0b99ccf84ab7ffe3be600.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.02b70a97c3c0b99ccf84ab7ffe3be600.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:680 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4952 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3708 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4204
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
293KB
MD5264943634b5a224595a3c49e382065f3
SHA117a176ef7ab08de17874feae572036c5c5890249
SHA256a5ada09653db92cc6bdc159b2ff3610012369cf98ec9e94402049bb187040442
SHA5124de038d3541c91c1c102f97ed90c7311ce321b36d4541b41dd74c3c6cc39d46745a6a2f8dd2c09b92de63b926b18c8289bad377396b448d664740631f913eecf
-
Filesize
292KB
MD55f325511d1c1d6d4bc99c35655e1f163
SHA10c849e52c35280c1d935204031909d36b05fd24c
SHA2569f1d3767e45834447d501fbb607accae0363499ba6900a1b22eb306f4e47b149
SHA5120d5f52cdc036cb1198e34507feefc750877c7ce056c5b374164e03cb10d1aa79c8cef4970c0038a264908428ef940b7da1c7392f41169e8b34493acf746f4cb5
-
Filesize
293KB
MD5a2562e5b26ea61c09420a4ba685e7f3f
SHA16e7084599d4ec13b117dfeda869474dde0a7b056
SHA256c84355385abdd7a90da68cfa0759f275b439cc2d33bde1d9fba0832f4d8da6a0
SHA5125016144c29abbae07bbbfc3e08aa22d0d635c311d01de746cab00ed4c0ca087805d4503c82aa3a95519c7f5bc2a8acc99187bc06e8472e5364cce47724777635
-
Filesize
293KB
MD5a2562e5b26ea61c09420a4ba685e7f3f
SHA16e7084599d4ec13b117dfeda869474dde0a7b056
SHA256c84355385abdd7a90da68cfa0759f275b439cc2d33bde1d9fba0832f4d8da6a0
SHA5125016144c29abbae07bbbfc3e08aa22d0d635c311d01de746cab00ed4c0ca087805d4503c82aa3a95519c7f5bc2a8acc99187bc06e8472e5364cce47724777635
-
Filesize
293KB
MD5a2562e5b26ea61c09420a4ba685e7f3f
SHA16e7084599d4ec13b117dfeda869474dde0a7b056
SHA256c84355385abdd7a90da68cfa0759f275b439cc2d33bde1d9fba0832f4d8da6a0
SHA5125016144c29abbae07bbbfc3e08aa22d0d635c311d01de746cab00ed4c0ca087805d4503c82aa3a95519c7f5bc2a8acc99187bc06e8472e5364cce47724777635
-
Filesize
293KB
MD548575234c51d1f1844dcc0ab7f5c5511
SHA164e191b3b5273291e4007951f7959482cd969860
SHA25666b8ae12cc1781577b2aa139011ba732b5cf90c7a08168567bcc9771ddab5130
SHA512fce4d32385cc0b5b6b6523654e36d743a40e241a8cf7161542b8580f19595321cbdf839adb2c290147e9770fb5bb5c062b9f3d706da50f2ea3dc62557daa83ae
-
Filesize
292KB
MD55f325511d1c1d6d4bc99c35655e1f163
SHA10c849e52c35280c1d935204031909d36b05fd24c
SHA2569f1d3767e45834447d501fbb607accae0363499ba6900a1b22eb306f4e47b149
SHA5120d5f52cdc036cb1198e34507feefc750877c7ce056c5b374164e03cb10d1aa79c8cef4970c0038a264908428ef940b7da1c7392f41169e8b34493acf746f4cb5
-
Filesize
293KB
MD5a2562e5b26ea61c09420a4ba685e7f3f
SHA16e7084599d4ec13b117dfeda869474dde0a7b056
SHA256c84355385abdd7a90da68cfa0759f275b439cc2d33bde1d9fba0832f4d8da6a0
SHA5125016144c29abbae07bbbfc3e08aa22d0d635c311d01de746cab00ed4c0ca087805d4503c82aa3a95519c7f5bc2a8acc99187bc06e8472e5364cce47724777635
-
Filesize
293KB
MD548575234c51d1f1844dcc0ab7f5c5511
SHA164e191b3b5273291e4007951f7959482cd969860
SHA25666b8ae12cc1781577b2aa139011ba732b5cf90c7a08168567bcc9771ddab5130
SHA512fce4d32385cc0b5b6b6523654e36d743a40e241a8cf7161542b8580f19595321cbdf839adb2c290147e9770fb5bb5c062b9f3d706da50f2ea3dc62557daa83ae