Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d878ac42780306072f4d8b7752a51ab0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.d878ac42780306072f4d8b7752a51ab0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.d878ac42780306072f4d8b7752a51ab0.exe
-
Size
484KB
-
MD5
d878ac42780306072f4d8b7752a51ab0
-
SHA1
f9c7c2e2c0c4e39a00cfc75197bade024b05493d
-
SHA256
977fce4369dba1f444e4c3b0bd00918eda446141fe16ee6ea7d4963711feb863
-
SHA512
3f87c3f701bcfcf1497eed2986d20b3bcbf85b7866ac180d7263656158ccbc259ecf752422611945f921b2eaec27c60700c01e989419d68a193d9dc50de24ae0
-
SSDEEP
12288:3LPkCDt1EG2XVekhdeTtUNjkrZiRjRaFvy:3LPkQ1bqAV7r4R9aFvy
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 452 Dismdiag.exe 1668 dpapuery.exe 1288 ~877F.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dpnsgini = "C:\\Users\\Admin\\AppData\\Roaming\\replmote\\Dismdiag.exe" NEAS.d878ac42780306072f4d8b7752a51ab0.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\dpapuery.exe NEAS.d878ac42780306072f4d8b7752a51ab0.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4000 4372 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 452 Dismdiag.exe 452 Dismdiag.exe 1668 dpapuery.exe 1668 dpapuery.exe 3096 Explorer.EXE 3096 Explorer.EXE 1668 dpapuery.exe 1668 dpapuery.exe 3096 Explorer.EXE 3096 Explorer.EXE 1668 dpapuery.exe 1668 dpapuery.exe 3096 Explorer.EXE 3096 Explorer.EXE 1668 dpapuery.exe 1668 dpapuery.exe 3096 Explorer.EXE 3096 Explorer.EXE 1668 dpapuery.exe 1668 dpapuery.exe 3096 Explorer.EXE 3096 Explorer.EXE 1668 dpapuery.exe 1668 dpapuery.exe 3096 Explorer.EXE 3096 Explorer.EXE 1668 dpapuery.exe 1668 dpapuery.exe 3096 Explorer.EXE 3096 Explorer.EXE 1668 dpapuery.exe 1668 dpapuery.exe 3096 Explorer.EXE 3096 Explorer.EXE 1668 dpapuery.exe 1668 dpapuery.exe 3096 Explorer.EXE 3096 Explorer.EXE 1668 dpapuery.exe 1668 dpapuery.exe 3096 Explorer.EXE 3096 Explorer.EXE 1668 dpapuery.exe 1668 dpapuery.exe 3096 Explorer.EXE 3096 Explorer.EXE 1668 dpapuery.exe 1668 dpapuery.exe 3096 Explorer.EXE 3096 Explorer.EXE 1668 dpapuery.exe 1668 dpapuery.exe 3096 Explorer.EXE 3096 Explorer.EXE 1668 dpapuery.exe 1668 dpapuery.exe 3096 Explorer.EXE 3096 Explorer.EXE 1668 dpapuery.exe 1668 dpapuery.exe 3096 Explorer.EXE 3096 Explorer.EXE 1668 dpapuery.exe 1668 dpapuery.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3096 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 452 Dismdiag.exe Token: SeShutdownPrivilege 3096 Explorer.EXE Token: SeCreatePagefilePrivilege 3096 Explorer.EXE Token: SeShutdownPrivilege 3096 Explorer.EXE Token: SeCreatePagefilePrivilege 3096 Explorer.EXE Token: SeShutdownPrivilege 3096 Explorer.EXE Token: SeCreatePagefilePrivilege 3096 Explorer.EXE Token: SeShutdownPrivilege 3096 Explorer.EXE Token: SeCreatePagefilePrivilege 3096 Explorer.EXE Token: SeShutdownPrivilege 3096 Explorer.EXE Token: SeCreatePagefilePrivilege 3096 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3096 Explorer.EXE 3096 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3096 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4372 wrote to memory of 452 4372 NEAS.d878ac42780306072f4d8b7752a51ab0.exe 89 PID 4372 wrote to memory of 452 4372 NEAS.d878ac42780306072f4d8b7752a51ab0.exe 89 PID 4372 wrote to memory of 452 4372 NEAS.d878ac42780306072f4d8b7752a51ab0.exe 89 PID 452 wrote to memory of 1288 452 Dismdiag.exe 92 PID 452 wrote to memory of 1288 452 Dismdiag.exe 92 PID 1288 wrote to memory of 3096 1288 ~877F.tmp 16
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\NEAS.d878ac42780306072f4d8b7752a51ab0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d878ac42780306072f4d8b7752a51ab0.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Roaming\replmote\Dismdiag.exe"C:\Users\Admin\AppData\Roaming\replmote"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\~877F.tmp3096 496136 452 14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1288
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4372 -s 6243⤵
- Program crash
PID:4000
-
-
-
C:\Windows\SysWOW64\dpapuery.exeC:\Windows\SysWOW64\dpapuery.exe -s1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4372 -ip 43721⤵PID:3440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5aac3165ece2959f39ff98334618d10d9
SHA1020a191bfdc70c1fbd3bf74cd7479258bd197f51
SHA25696fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974
SHA5129eb876812a6a13dd4b090788c2b1d9e9a2e25370598ed5c040f82e6f378edc4b78d58bc8f60d5a559ea57b1edcf3a144bfe09454a9928997173db8279d5b40cf
-
Filesize
8KB
MD5aac3165ece2959f39ff98334618d10d9
SHA1020a191bfdc70c1fbd3bf74cd7479258bd197f51
SHA25696fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974
SHA5129eb876812a6a13dd4b090788c2b1d9e9a2e25370598ed5c040f82e6f378edc4b78d58bc8f60d5a559ea57b1edcf3a144bfe09454a9928997173db8279d5b40cf
-
Filesize
484KB
MD58ffc2612c6190a5a242d2e556579592c
SHA1bd8676aaffe8321fad46416ca33dfee564d6b126
SHA2563f75c76be31006bf8ee04cd970e732572c613606fa179ef80c125d3a82b9b21e
SHA51282874ee0bad032a5e428963920231fd2b430899cd300a60b9fc5ff67f3be0f77eb1cb4dc5a7eef81a22cbfe85069646968b5e6f10974edc41a71fb9d623f89ee
-
Filesize
484KB
MD58ffc2612c6190a5a242d2e556579592c
SHA1bd8676aaffe8321fad46416ca33dfee564d6b126
SHA2563f75c76be31006bf8ee04cd970e732572c613606fa179ef80c125d3a82b9b21e
SHA51282874ee0bad032a5e428963920231fd2b430899cd300a60b9fc5ff67f3be0f77eb1cb4dc5a7eef81a22cbfe85069646968b5e6f10974edc41a71fb9d623f89ee
-
Filesize
484KB
MD58ffc2612c6190a5a242d2e556579592c
SHA1bd8676aaffe8321fad46416ca33dfee564d6b126
SHA2563f75c76be31006bf8ee04cd970e732572c613606fa179ef80c125d3a82b9b21e
SHA51282874ee0bad032a5e428963920231fd2b430899cd300a60b9fc5ff67f3be0f77eb1cb4dc5a7eef81a22cbfe85069646968b5e6f10974edc41a71fb9d623f89ee
-
Filesize
484KB
MD58ffc2612c6190a5a242d2e556579592c
SHA1bd8676aaffe8321fad46416ca33dfee564d6b126
SHA2563f75c76be31006bf8ee04cd970e732572c613606fa179ef80c125d3a82b9b21e
SHA51282874ee0bad032a5e428963920231fd2b430899cd300a60b9fc5ff67f3be0f77eb1cb4dc5a7eef81a22cbfe85069646968b5e6f10974edc41a71fb9d623f89ee