Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2023 05:02
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.7fe9c8d26917cca3ab674f3b726147b0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.7fe9c8d26917cca3ab674f3b726147b0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.7fe9c8d26917cca3ab674f3b726147b0.exe
-
Size
212KB
-
MD5
7fe9c8d26917cca3ab674f3b726147b0
-
SHA1
5583509fb9ccc0786042d58335b5e428d6749a4e
-
SHA256
47a23873f6e88d48160cbaa738c0dcf0eb83b910beac17d716a773ed1a31a94d
-
SHA512
cd8ff61fa843a289e3e724a1f67d4f31ff08d49b943f245e28f91eee36fe532717c8151a0826450bf3491216b94a966bb02c48e3ef6f0694fed71f8ac36d428e
-
SSDEEP
6144:SxNqLW6opBZMU/y/JEGjg+op2BSNCCr7/jU:MA6NBT/yEGjWwa7vU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3780 svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\32ea1904 = "C:\\Windows\\apppatch\\svchost.exe" NEAS.7fe9c8d26917cca3ab674f3b726147b0.exe -
Drops file in Program Files directory 21 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\puzylyp.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyhub.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vojyqem.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\purylev.com svchost.exe File created C:\Program Files (x86)\Windows Defender\volykit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyrysor.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\svchost.exe NEAS.7fe9c8d26917cca3ab674f3b726147b0.exe File created C:\Windows\apppatch\svchost.exe NEAS.7fe9c8d26917cca3ab674f3b726147b0.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 5096 3780 WerFault.exe 89 4480 3780 WerFault.exe 89 -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 388 NEAS.7fe9c8d26917cca3ab674f3b726147b0.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 388 NEAS.7fe9c8d26917cca3ab674f3b726147b0.exe Token: SeSecurityPrivilege 388 NEAS.7fe9c8d26917cca3ab674f3b726147b0.exe Token: SeSecurityPrivilege 3780 svchost.exe Token: SeSecurityPrivilege 3780 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 388 wrote to memory of 3780 388 NEAS.7fe9c8d26917cca3ab674f3b726147b0.exe 89 PID 388 wrote to memory of 3780 388 NEAS.7fe9c8d26917cca3ab674f3b726147b0.exe 89 PID 388 wrote to memory of 3780 388 NEAS.7fe9c8d26917cca3ab674f3b726147b0.exe 89 PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 4580 3780 svchost.exe PID 3780 wrote to memory of 812 3780 svchost.exe PID 3780 wrote to memory of 812 3780 svchost.exe PID 3780 wrote to memory of 812 3780 svchost.exe PID 3780 wrote to memory of 812 3780 svchost.exe PID 3780 wrote to memory of 812 3780 svchost.exe PID 3780 wrote to memory of 812 3780 svchost.exe PID 3780 wrote to memory of 812 3780 svchost.exe PID 3780 wrote to memory of 812 3780 svchost.exe PID 3780 wrote to memory of 812 3780 svchost.exe PID 3780 wrote to memory of 812 3780 svchost.exe PID 3780 wrote to memory of 812 3780 svchost.exe PID 3780 wrote to memory of 812 3780 svchost.exe PID 3780 wrote to memory of 812 3780 svchost.exe PID 3780 wrote to memory of 812 3780 svchost.exe PID 3780 wrote to memory of 812 3780 svchost.exe PID 3780 wrote to memory of 812 3780 svchost.exe PID 3780 wrote to memory of 812 3780 svchost.exe PID 3780 wrote to memory of 812 3780 svchost.exe PID 3780 wrote to memory of 812 3780 svchost.exe PID 3780 wrote to memory of 812 3780 svchost.exe PID 3780 wrote to memory of 812 3780 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.7fe9c8d26917cca3ab674f3b726147b0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.7fe9c8d26917cca3ab674f3b726147b0.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 42643⤵
- Program crash
PID:5096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 30283⤵
- Program crash
PID:4480
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3780 -ip 37801⤵PID:2840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3780 -ip 37801⤵PID:4792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
212KB
MD5d777f32d7486561b0080cbc8777ee891
SHA1bce12d7d687575a7dcb9264382a04708f7803a77
SHA2568f67a8307123e48420bb1619b038ce671370a8335d645e97094eaff7c3b6bdcc
SHA512010eb31203db64b9ab920d4d71ecf596a017b6e955991e6013dfea2ea118f378752b80bb19677ebbba1b7c7d9453991a9cef52bd035a3ddf3f6eebd1070eb191
-
Filesize
212KB
MD5d777f32d7486561b0080cbc8777ee891
SHA1bce12d7d687575a7dcb9264382a04708f7803a77
SHA2568f67a8307123e48420bb1619b038ce671370a8335d645e97094eaff7c3b6bdcc
SHA512010eb31203db64b9ab920d4d71ecf596a017b6e955991e6013dfea2ea118f378752b80bb19677ebbba1b7c7d9453991a9cef52bd035a3ddf3f6eebd1070eb191
-
Filesize
212KB
MD5d777f32d7486561b0080cbc8777ee891
SHA1bce12d7d687575a7dcb9264382a04708f7803a77
SHA2568f67a8307123e48420bb1619b038ce671370a8335d645e97094eaff7c3b6bdcc
SHA512010eb31203db64b9ab920d4d71ecf596a017b6e955991e6013dfea2ea118f378752b80bb19677ebbba1b7c7d9453991a9cef52bd035a3ddf3f6eebd1070eb191