Analysis
-
max time kernel
142s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2023 05:54
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.604c13e89b7040430744c9059dd73200.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.604c13e89b7040430744c9059dd73200.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.604c13e89b7040430744c9059dd73200.exe
-
Size
212KB
-
MD5
604c13e89b7040430744c9059dd73200
-
SHA1
d9623dca9729ffcf4bca36bb666b4fd11de9fd3f
-
SHA256
6e3dacdd8a7cc77daa5a99209683c33f5c99cc3aad07651faa75fbd362742452
-
SHA512
669c494588f1b42ef741285b9dbe57c141675e2207af9918fddb72134ade97c912982006f903812481d357a3d1391477ac3d9eaeb16d7affcd91ecab33a5e29d
-
SSDEEP
6144:4xNqLW6opBZMU/y/JEGjg+op2BSNCCr7/jU:+A6NBT/yEGjWwa7vU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4908 svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\99f7c49 = "C:\\Windows\\apppatch\\svchost.exe" NEAS.604c13e89b7040430744c9059dd73200.exe -
Drops file in Program Files directory 22 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\purylev.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyrysor.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyhub.com svchost.exe File created C:\Program Files (x86)\Windows Defender\volykit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vojyqem.com svchost.exe File created C:\Program Files (x86)\Windows Defender\puzylyp.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe NEAS.604c13e89b7040430744c9059dd73200.exe File opened for modification C:\Windows\apppatch\svchost.exe NEAS.604c13e89b7040430744c9059dd73200.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3608 4908 WerFault.exe 88 -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe 4908 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1124 NEAS.604c13e89b7040430744c9059dd73200.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1124 NEAS.604c13e89b7040430744c9059dd73200.exe Token: SeSecurityPrivilege 1124 NEAS.604c13e89b7040430744c9059dd73200.exe Token: SeSecurityPrivilege 4908 svchost.exe Token: SeSecurityPrivilege 4908 svchost.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1124 wrote to memory of 4908 1124 NEAS.604c13e89b7040430744c9059dd73200.exe 88 PID 1124 wrote to memory of 4908 1124 NEAS.604c13e89b7040430744c9059dd73200.exe 88 PID 1124 wrote to memory of 4908 1124 NEAS.604c13e89b7040430744c9059dd73200.exe 88 PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe PID 4908 wrote to memory of 3516 4908 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.604c13e89b7040430744c9059dd73200.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.604c13e89b7040430744c9059dd73200.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 43843⤵
- Program crash
PID:3608
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 4908 -ip 49081⤵PID:184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
212KB
MD52d53da38a5bdc509cdb936afb3a7ed16
SHA1bf5fa93718da955a0ff3993070a10e4f8d54fd23
SHA256d973b01b1365e43f968367af2e0f4170d48c63c2ce0cfc476d4568da29ce45a1
SHA512de760a798670a1d6dde79853be89b64a779a068b47d02863b0ef8ec1d6ed5fca37bcb4740cfce9eed9d1a725c0037f4f4ffddfaefc977ace52ea29612b1cd639
-
Filesize
212KB
MD52d53da38a5bdc509cdb936afb3a7ed16
SHA1bf5fa93718da955a0ff3993070a10e4f8d54fd23
SHA256d973b01b1365e43f968367af2e0f4170d48c63c2ce0cfc476d4568da29ce45a1
SHA512de760a798670a1d6dde79853be89b64a779a068b47d02863b0ef8ec1d6ed5fca37bcb4740cfce9eed9d1a725c0037f4f4ffddfaefc977ace52ea29612b1cd639
-
Filesize
212KB
MD52d53da38a5bdc509cdb936afb3a7ed16
SHA1bf5fa93718da955a0ff3993070a10e4f8d54fd23
SHA256d973b01b1365e43f968367af2e0f4170d48c63c2ce0cfc476d4568da29ce45a1
SHA512de760a798670a1d6dde79853be89b64a779a068b47d02863b0ef8ec1d6ed5fca37bcb4740cfce9eed9d1a725c0037f4f4ffddfaefc977ace52ea29612b1cd639