Analysis
-
max time kernel
172s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
15-11-2023 05:54
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.604c13e89b7040430744c9059dd73200.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.604c13e89b7040430744c9059dd73200.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.604c13e89b7040430744c9059dd73200.exe
-
Size
212KB
-
MD5
604c13e89b7040430744c9059dd73200
-
SHA1
d9623dca9729ffcf4bca36bb666b4fd11de9fd3f
-
SHA256
6e3dacdd8a7cc77daa5a99209683c33f5c99cc3aad07651faa75fbd362742452
-
SHA512
669c494588f1b42ef741285b9dbe57c141675e2207af9918fddb72134ade97c912982006f903812481d357a3d1391477ac3d9eaeb16d7affcd91ecab33a5e29d
-
SSDEEP
6144:4xNqLW6opBZMU/y/JEGjg+op2BSNCCr7/jU:+A6NBT/yEGjWwa7vU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2620 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1580 NEAS.604c13e89b7040430744c9059dd73200.exe 1580 NEAS.604c13e89b7040430744c9059dd73200.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\6cf37bd2 = "C:\\Windows\\apppatch\\svchost.exe" NEAS.604c13e89b7040430744c9059dd73200.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyrysor.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\volykit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vojyqem.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\puzylyp.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\purylev.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyhub.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe NEAS.604c13e89b7040430744c9059dd73200.exe File opened for modification C:\Windows\apppatch\svchost.exe NEAS.604c13e89b7040430744c9059dd73200.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2620 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1580 NEAS.604c13e89b7040430744c9059dd73200.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1580 NEAS.604c13e89b7040430744c9059dd73200.exe Token: SeSecurityPrivilege 1580 NEAS.604c13e89b7040430744c9059dd73200.exe Token: SeSecurityPrivilege 2620 svchost.exe Token: SeSecurityPrivilege 2620 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2620 1580 NEAS.604c13e89b7040430744c9059dd73200.exe 29 PID 1580 wrote to memory of 2620 1580 NEAS.604c13e89b7040430744c9059dd73200.exe 29 PID 1580 wrote to memory of 2620 1580 NEAS.604c13e89b7040430744c9059dd73200.exe 29 PID 1580 wrote to memory of 2620 1580 NEAS.604c13e89b7040430744c9059dd73200.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.604c13e89b7040430744c9059dd73200.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.604c13e89b7040430744c9059dd73200.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51445e59b38f54be8786b1354a524767c
SHA15058d84f663d392713ab4e99ee28732b913b7f74
SHA256cc485c28fab1c32effcfcf2cebb7850255e3689047ca1b7f733c482145c22333
SHA512b1ac537a6e16cab7cf4c6112d3c9ab623d8cabbe2dcfdc8382053922e712942ded17d80482bea1b423bf69076c1683f0c09d4a590f297580c47d83ca2651b8fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e18a9c33c39de357dccf31f1c2401ab9
SHA166517ab86382d03544a607b9023c65d15c19d5dc
SHA2563c839f58be330452cec3d772e4bd45f14f74bddcd128a72540a8668709849d25
SHA512b922e73993b4eaa0d72c9a61ca34b4f2458a09706708168ff037bb6e541e81864fa8d091dc4c5d721417b4ddd9b22419a1ea74abf1917b604b5e1d1a9c131f6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509a2324cc8991fc28f05fca918e4b7ac
SHA1ffd8ab30f17f1d653b581b192e4d57dcb6a93078
SHA256a49d3027f4d5b2351eef064083e620efbc24725cfeb00d334e3416c4c3895afb
SHA51247f12ff27e96870db3f643aeaacc32285528d9339c9d33bb756f4c2c8d4a369dfed27c5b82cc02c4979e8b3aececbd2a750e6d8db4264ee9bb559612a9d421f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fb36089ed6f32b2f064457424ab9e7f
SHA1b2b2c8b1f5acbb7403b650eee8e0d9795644e664
SHA256ca11f5a81a6b437870c3c0411846a807134c9eca34892d604e4014401d166b89
SHA512fda5703b7a02ea03fd9b36939277048c770810776dd6c57ba574f0880c69135576bb557822fe3b40ee44dcaed992b2858961b8f04d7a9c2d28ac92db36a7e492
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
212KB
MD517fb2929edf20d5702b04146f34d3840
SHA188f34aa08a741ee5d3cd7978cc7fffb027892e40
SHA2560d1c85c4d252ed290c73bdd434752d910c0caab6782c29ad83a71249be775985
SHA5128db866ea34a504e8698c4f23c4b708cf19c81da87e433aa1483f5a26d509d6ebf061f91520fdd237f494d0423498cf2a191ec349c7e6bed7dd57fcb570718c24
-
Filesize
212KB
MD517fb2929edf20d5702b04146f34d3840
SHA188f34aa08a741ee5d3cd7978cc7fffb027892e40
SHA2560d1c85c4d252ed290c73bdd434752d910c0caab6782c29ad83a71249be775985
SHA5128db866ea34a504e8698c4f23c4b708cf19c81da87e433aa1483f5a26d509d6ebf061f91520fdd237f494d0423498cf2a191ec349c7e6bed7dd57fcb570718c24
-
Filesize
212KB
MD517fb2929edf20d5702b04146f34d3840
SHA188f34aa08a741ee5d3cd7978cc7fffb027892e40
SHA2560d1c85c4d252ed290c73bdd434752d910c0caab6782c29ad83a71249be775985
SHA5128db866ea34a504e8698c4f23c4b708cf19c81da87e433aa1483f5a26d509d6ebf061f91520fdd237f494d0423498cf2a191ec349c7e6bed7dd57fcb570718c24
-
Filesize
212KB
MD517fb2929edf20d5702b04146f34d3840
SHA188f34aa08a741ee5d3cd7978cc7fffb027892e40
SHA2560d1c85c4d252ed290c73bdd434752d910c0caab6782c29ad83a71249be775985
SHA5128db866ea34a504e8698c4f23c4b708cf19c81da87e433aa1483f5a26d509d6ebf061f91520fdd237f494d0423498cf2a191ec349c7e6bed7dd57fcb570718c24
-
Filesize
212KB
MD517fb2929edf20d5702b04146f34d3840
SHA188f34aa08a741ee5d3cd7978cc7fffb027892e40
SHA2560d1c85c4d252ed290c73bdd434752d910c0caab6782c29ad83a71249be775985
SHA5128db866ea34a504e8698c4f23c4b708cf19c81da87e433aa1483f5a26d509d6ebf061f91520fdd237f494d0423498cf2a191ec349c7e6bed7dd57fcb570718c24