Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
16-11-2023 10:20
Behavioral task
behavioral1
Sample
NEAS.afc0e8ca805126afea6a435f63a87820.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.afc0e8ca805126afea6a435f63a87820.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.afc0e8ca805126afea6a435f63a87820.exe
-
Size
210KB
-
MD5
afc0e8ca805126afea6a435f63a87820
-
SHA1
e85b1556917ae98d63ad0d2271caa33c1489c03a
-
SHA256
e52400988a07ce80c2b963cff043e868dcd58b804304e878c882dd398c94a418
-
SHA512
4d4dad888ff21a27c77738d96781b53b220642a6f1dbf54edb5ed6a5855e7a8205c21779a1dcfc9d3d97714bff5b3fa71d236a5f114e6c2d8600ae9e535c8e49
-
SSDEEP
3072:KhS7VD4/EnzzMUD8u8EC45xRS5b7lIf3GYHfqR1hAtTD5DyXglREK0c2:dOizzb8uDxZCHlIZgEh5DyXglh
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x000e00000001225d-14.dat aspack_v212_v242 behavioral1/files/0x000e00000001225d-18.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2668 CRIWIQU.EXE -
Modifies system executable filetype association 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command CRIWIQU.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command NEAS.afc0e8ca805126afea6a435f63a87820.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\$Recycle.Bin\\CGU.EXE \"%1\" %*" NEAS.afc0e8ca805126afea6a435f63a87820.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VVZ.EXE = "C:\\System Volume Information\\OJWMH.EXE" NEAS.afc0e8ca805126afea6a435f63a87820.exe -
Enumerates connected drives 3 TTPs 17 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: NEAS.afc0e8ca805126afea6a435f63a87820.exe File opened (read-only) \??\J: NEAS.afc0e8ca805126afea6a435f63a87820.exe File opened (read-only) \??\L: NEAS.afc0e8ca805126afea6a435f63a87820.exe File opened (read-only) \??\Q: NEAS.afc0e8ca805126afea6a435f63a87820.exe File opened (read-only) \??\T: NEAS.afc0e8ca805126afea6a435f63a87820.exe File opened (read-only) \??\U: NEAS.afc0e8ca805126afea6a435f63a87820.exe File opened (read-only) \??\E: NEAS.afc0e8ca805126afea6a435f63a87820.exe File opened (read-only) \??\K: NEAS.afc0e8ca805126afea6a435f63a87820.exe File opened (read-only) \??\O: NEAS.afc0e8ca805126afea6a435f63a87820.exe File opened (read-only) \??\P: NEAS.afc0e8ca805126afea6a435f63a87820.exe File opened (read-only) \??\R: NEAS.afc0e8ca805126afea6a435f63a87820.exe File opened (read-only) \??\S: NEAS.afc0e8ca805126afea6a435f63a87820.exe File opened (read-only) \??\V: NEAS.afc0e8ca805126afea6a435f63a87820.exe File opened (read-only) \??\H: NEAS.afc0e8ca805126afea6a435f63a87820.exe File opened (read-only) \??\I: NEAS.afc0e8ca805126afea6a435f63a87820.exe File opened (read-only) \??\M: NEAS.afc0e8ca805126afea6a435f63a87820.exe File opened (read-only) \??\N: NEAS.afc0e8ca805126afea6a435f63a87820.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\CRIWIQU.EXE NEAS.afc0e8ca805126afea6a435f63a87820.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inifile\shell\open\command\ = "C:\\System Volume Information\\VURDFD.EXE %1" NEAS.afc0e8ca805126afea6a435f63a87820.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file NEAS.afc0e8ca805126afea6a435f63a87820.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file\shell NEAS.afc0e8ca805126afea6a435f63a87820.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command NEAS.afc0e8ca805126afea6a435f63a87820.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inifile\shell\open\command NEAS.afc0e8ca805126afea6a435f63a87820.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\System Volume Information\\DEMUDZ.EXE %1" NEAS.afc0e8ca805126afea6a435f63a87820.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file\shell\open\command NEAS.afc0e8ca805126afea6a435f63a87820.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\System Volume Information\\VURDFD.EXE \"%1\"" NEAS.afc0e8ca805126afea6a435f63a87820.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command CRIWIQU.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file\shell\open NEAS.afc0e8ca805126afea6a435f63a87820.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command NEAS.afc0e8ca805126afea6a435f63a87820.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\$Recycle.Bin\\CGU.EXE \"%1\" %*" NEAS.afc0e8ca805126afea6a435f63a87820.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command NEAS.afc0e8ca805126afea6a435f63a87820.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "C:\\System Volume Information\\VURDFD.EXE \"%1\"" NEAS.afc0e8ca805126afea6a435f63a87820.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command NEAS.afc0e8ca805126afea6a435f63a87820.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2668 CRIWIQU.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2668 3068 NEAS.afc0e8ca805126afea6a435f63a87820.exe 28 PID 3068 wrote to memory of 2668 3068 NEAS.afc0e8ca805126afea6a435f63a87820.exe 28 PID 3068 wrote to memory of 2668 3068 NEAS.afc0e8ca805126afea6a435f63a87820.exe 28 PID 3068 wrote to memory of 2668 3068 NEAS.afc0e8ca805126afea6a435f63a87820.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.afc0e8ca805126afea6a435f63a87820.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.afc0e8ca805126afea6a435f63a87820.exe"1⤵
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\CRIWIQU.EXEC:\Windows\CRIWIQU.EXE2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD59eb10f4fe50726bd93a9afc2eafab948
SHA178b9f56fe2798b1834d628061319b25d1debdd99
SHA2561dbf42bfdff22ed8b465e6987ede02cbc0f5b0e74a15cf62faa320e68f51f8a9
SHA512a66e03a1b2d0166a8c8904e4ac2cc125b51d8db75e9b0c4f50b1346d1419f2f4c0bc15eb41948dab749117eedd39faa6ce8f0a705c8a1be341cf4676a376cbd6
-
Filesize
211KB
MD59eb10f4fe50726bd93a9afc2eafab948
SHA178b9f56fe2798b1834d628061319b25d1debdd99
SHA2561dbf42bfdff22ed8b465e6987ede02cbc0f5b0e74a15cf62faa320e68f51f8a9
SHA512a66e03a1b2d0166a8c8904e4ac2cc125b51d8db75e9b0c4f50b1346d1419f2f4c0bc15eb41948dab749117eedd39faa6ce8f0a705c8a1be341cf4676a376cbd6