Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
16/11/2023, 22:38
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.fe3d834833d66e011d79fbebf00a3ad0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.fe3d834833d66e011d79fbebf00a3ad0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.fe3d834833d66e011d79fbebf00a3ad0.exe
-
Size
108KB
-
MD5
fe3d834833d66e011d79fbebf00a3ad0
-
SHA1
6de99a7fcd54a88edc47e46d22b3700f0182254a
-
SHA256
afef7002dda0b9c446451cffcf3c7fcf66ebddd8f9a3b54d44675c453e00a2d2
-
SHA512
267184ad47e8a4e3965f1d8ce4482506dc39f20988ff436d246f16c75964b86ddf10533742e535cbad1e1c5017fb9697424d41ff808ca94334917c177ace029b
-
SSDEEP
1536:5HUzh9PWe+nBqWRucnRWG1idIvf1xjij+p4jlS2fbwU7h4HVQJeX:OieaBqWjWG1idCQF+VX
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" NEAS.fe3d834833d66e011d79fbebf00a3ad0.exe Set value (int) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wiione.exe -
Executes dropped EXE 1 IoCs
pid Process 1752 wiione.exe -
Loads dropped DLL 2 IoCs
pid Process 2248 NEAS.fe3d834833d66e011d79fbebf00a3ad0.exe 2248 NEAS.fe3d834833d66e011d79fbebf00a3ad0.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /r" wiione.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /e" wiione.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /t" wiione.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /n" wiione.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /k" wiione.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /w" wiione.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /p" wiione.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /v" wiione.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /q" wiione.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /b" wiione.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /x" wiione.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /z" wiione.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /s" wiione.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /a" wiione.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /f" wiione.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /g" wiione.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /i" wiione.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /y" wiione.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /x" NEAS.fe3d834833d66e011d79fbebf00a3ad0.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /c" wiione.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /d" wiione.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /o" wiione.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /l" wiione.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /h" wiione.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /j" wiione.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /u" wiione.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiione = "C:\\Users\\Admin\\wiione.exe /m" wiione.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2248 NEAS.fe3d834833d66e011d79fbebf00a3ad0.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe 1752 wiione.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2248 NEAS.fe3d834833d66e011d79fbebf00a3ad0.exe 1752 wiione.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 1752 2248 NEAS.fe3d834833d66e011d79fbebf00a3ad0.exe 28 PID 2248 wrote to memory of 1752 2248 NEAS.fe3d834833d66e011d79fbebf00a3ad0.exe 28 PID 2248 wrote to memory of 1752 2248 NEAS.fe3d834833d66e011d79fbebf00a3ad0.exe 28 PID 2248 wrote to memory of 1752 2248 NEAS.fe3d834833d66e011d79fbebf00a3ad0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.fe3d834833d66e011d79fbebf00a3ad0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.fe3d834833d66e011d79fbebf00a3ad0.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\wiione.exe"C:\Users\Admin\wiione.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD53268b169077e1327b94ef5bdf6d50cef
SHA1829046f1f734ee90bab5b7586648dac30754a409
SHA2567815fc8ff6b38b3737a1274b28ae533d347b39973c93d410a5991b614fa35d63
SHA5127e3d53f5cb7265c1ea9c9c47b327b5b6994570f56eba7cc37066544facc92d3e1860ed87b888062da4f980360867ee467d981cb93eee5f2d8956ccc168675023
-
Filesize
108KB
MD53268b169077e1327b94ef5bdf6d50cef
SHA1829046f1f734ee90bab5b7586648dac30754a409
SHA2567815fc8ff6b38b3737a1274b28ae533d347b39973c93d410a5991b614fa35d63
SHA5127e3d53f5cb7265c1ea9c9c47b327b5b6994570f56eba7cc37066544facc92d3e1860ed87b888062da4f980360867ee467d981cb93eee5f2d8956ccc168675023
-
Filesize
108KB
MD53268b169077e1327b94ef5bdf6d50cef
SHA1829046f1f734ee90bab5b7586648dac30754a409
SHA2567815fc8ff6b38b3737a1274b28ae533d347b39973c93d410a5991b614fa35d63
SHA5127e3d53f5cb7265c1ea9c9c47b327b5b6994570f56eba7cc37066544facc92d3e1860ed87b888062da4f980360867ee467d981cb93eee5f2d8956ccc168675023
-
Filesize
108KB
MD53268b169077e1327b94ef5bdf6d50cef
SHA1829046f1f734ee90bab5b7586648dac30754a409
SHA2567815fc8ff6b38b3737a1274b28ae533d347b39973c93d410a5991b614fa35d63
SHA5127e3d53f5cb7265c1ea9c9c47b327b5b6994570f56eba7cc37066544facc92d3e1860ed87b888062da4f980360867ee467d981cb93eee5f2d8956ccc168675023
-
Filesize
108KB
MD53268b169077e1327b94ef5bdf6d50cef
SHA1829046f1f734ee90bab5b7586648dac30754a409
SHA2567815fc8ff6b38b3737a1274b28ae533d347b39973c93d410a5991b614fa35d63
SHA5127e3d53f5cb7265c1ea9c9c47b327b5b6994570f56eba7cc37066544facc92d3e1860ed87b888062da4f980360867ee467d981cb93eee5f2d8956ccc168675023