Analysis

  • max time kernel
    142s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/11/2023, 02:06

General

  • Target

    NEAS.322f9a41f7883e8292b9187684826c40.exe

  • Size

    141KB

  • MD5

    322f9a41f7883e8292b9187684826c40

  • SHA1

    a361f382992dd745159ab60e4b94ba5c3f86ca80

  • SHA256

    737c9375cd60423cbf0056af1e7b0e666e6c673d0f580e696161a01d5b551a48

  • SHA512

    5c6ecce696c81bbb9aa6acb6e1a55583cd169deed68710cee04872abfa9016382973e36a3478b7f2d9a710e2f5b01b578690f0525cb6e52541fed9c8c8963c6c

  • SSDEEP

    3072:ELlglTEH6xklGwA/qkwsjvxzzjNjljIxjfjA8bnIIIId:aqAHCntRlg/5

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 32 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies data under HKEY_USERS 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.322f9a41f7883e8292b9187684826c40.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.322f9a41f7883e8292b9187684826c40.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4068
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 setupapi,InstallHinfSection MSMAIL 132 msmail.inf
      2⤵
        PID:2068
      • C:\Windows\spoolut.exe
        "C:\Windows\spoolut.exe" -i
        2⤵
        • Modifies WinLogon for persistence
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:3576
    • C:\Windows\spoolut.exe
      C:\Windows\spoolut.exe -s
      1⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      PID:4952
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 1496
        2⤵
        • Program crash
        PID:4900
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
      1⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      PID:4352
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4952 -ip 4952
      1⤵
        PID:1816

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\spoolut.exe

              Filesize

              141KB

              MD5

              322f9a41f7883e8292b9187684826c40

              SHA1

              a361f382992dd745159ab60e4b94ba5c3f86ca80

              SHA256

              737c9375cd60423cbf0056af1e7b0e666e6c673d0f580e696161a01d5b551a48

              SHA512

              5c6ecce696c81bbb9aa6acb6e1a55583cd169deed68710cee04872abfa9016382973e36a3478b7f2d9a710e2f5b01b578690f0525cb6e52541fed9c8c8963c6c

            • C:\Windows\spoolut.exe

              Filesize

              141KB

              MD5

              322f9a41f7883e8292b9187684826c40

              SHA1

              a361f382992dd745159ab60e4b94ba5c3f86ca80

              SHA256

              737c9375cd60423cbf0056af1e7b0e666e6c673d0f580e696161a01d5b551a48

              SHA512

              5c6ecce696c81bbb9aa6acb6e1a55583cd169deed68710cee04872abfa9016382973e36a3478b7f2d9a710e2f5b01b578690f0525cb6e52541fed9c8c8963c6c

            • C:\Windows\spoolut.exe

              Filesize

              141KB

              MD5

              322f9a41f7883e8292b9187684826c40

              SHA1

              a361f382992dd745159ab60e4b94ba5c3f86ca80

              SHA256

              737c9375cd60423cbf0056af1e7b0e666e6c673d0f580e696161a01d5b551a48

              SHA512

              5c6ecce696c81bbb9aa6acb6e1a55583cd169deed68710cee04872abfa9016382973e36a3478b7f2d9a710e2f5b01b578690f0525cb6e52541fed9c8c8963c6c

            • C:\Windows\svchost.exe

              Filesize

              141KB

              MD5

              322f9a41f7883e8292b9187684826c40

              SHA1

              a361f382992dd745159ab60e4b94ba5c3f86ca80

              SHA256

              737c9375cd60423cbf0056af1e7b0e666e6c673d0f580e696161a01d5b551a48

              SHA512

              5c6ecce696c81bbb9aa6acb6e1a55583cd169deed68710cee04872abfa9016382973e36a3478b7f2d9a710e2f5b01b578690f0525cb6e52541fed9c8c8963c6c

            • C:\Windows\svchost.exe

              Filesize

              141KB

              MD5

              0eb848444dbf33ce8195ccba40cd7a0f

              SHA1

              75ca9b071dc49e436f9d7c76fa6ab2ac20f4609e

              SHA256

              1d27aa3eb6fb0b1677d63c167e9c33f4631481cb812a8e931d0a667ba10cdb4d

              SHA512

              402bbf63672b9ee7e6f180216af372fac82315e180e0a6d9c8336d290f5554a2be3a82a4679b6004a64fd7431664da32c549d05eb94d877dfdfebfa3f10ceec1

            • C:\Windows\svchost.exe

              Filesize

              141KB

              MD5

              322f9a41f7883e8292b9187684826c40

              SHA1

              a361f382992dd745159ab60e4b94ba5c3f86ca80

              SHA256

              737c9375cd60423cbf0056af1e7b0e666e6c673d0f580e696161a01d5b551a48

              SHA512

              5c6ecce696c81bbb9aa6acb6e1a55583cd169deed68710cee04872abfa9016382973e36a3478b7f2d9a710e2f5b01b578690f0525cb6e52541fed9c8c8963c6c

            • C:\torvil.log

              Filesize

              218B

              MD5

              76d6c819a5babd4c19149305810b65f8

              SHA1

              3af0d2198f338d368bd83081683f6313126aaa6f

              SHA256

              30e5835a32eedaf6d6b422b218c30eb6e8abdcd1cccd1d32b2fd43652a80179e

              SHA512

              cd972316897b5e744453c5d1c0c964ed41caf6af7bc73ebcb8f1593e52f53517705ba96c33c648bea68d623ea6861051bb224e88fd99afbd684fe2cf8eb46d6d

            • C:\torvil.log

              Filesize

              792B

              MD5

              6f005f030eeefc09d04311347c5e32b9

              SHA1

              7efa4b4661c991ccc75c8138a492aefbf05379b8

              SHA256

              d267414403884d345a6709014fc9cc066bcd0f6cb8387d329846585766558d7c

              SHA512

              7ce512543453bb28ec233a520e1fb03e804aa03137f6b2c6700f9fed4740951902f4db346577818ed89a9e01e5bb135ec0109cf299af68f76383d4e17801fcf3

            • C:\torvil.log

              Filesize

              3KB

              MD5

              0a6b33d702eb233cbb7ac8794a6ea364

              SHA1

              d44d6684d1ec9c07a1b984ffb1e7181d1d18706e

              SHA256

              aeceb53fd33ace0f5b8df0596845f8c71598f1db1e3a4ea9b7c606cba1cc6316

              SHA512

              28d49927f8194c730f0c39dbb10a93eca81e682400f1c27c207427a40fe1a9a3c4dd4463330ba3cc2b4fe2f0f06506d703b22ac9f4092b133a4f123c5dd527a3