Analysis
-
max time kernel
146s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
17/11/2023, 01:38
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.665e38a9c0c37947cfe9d92290da2380.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.665e38a9c0c37947cfe9d92290da2380.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.665e38a9c0c37947cfe9d92290da2380.exe
-
Size
344KB
-
MD5
665e38a9c0c37947cfe9d92290da2380
-
SHA1
98088121719427b7e911c899f639ae007e624368
-
SHA256
dd338ea97fec386923cdfecf3ff4aecac8ac51e494ba8c7e208a1ba51f8f0242
-
SHA512
8e476e58f15f53807f7223b8d418177f3c4a6449713dadf9c20ed779c22f5d27ec47263dae698be3a2cfeb65c9db49d120d38301d47c2715ba9a440bb709190d
-
SSDEEP
6144:fDezYKB9auYv4+B475uBvn1M41NaIFJBdRGLYW3/8ruxIQuGgs8s6Bqyq0Au7pXg:fSzvQv4+BNv1MEaIFJ1WYQ/VIQv8ASlw
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1964 Client.exe 2636 Client.exe 1752 Client.exe 2836 Client.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows.Troubleshooter = "\"C:\\Windows\\SysWOW64\\SubDir\\Client.exe\"" Client.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\SubDir\Client.exe NEAS.665e38a9c0c37947cfe9d92290da2380.exe File opened for modification C:\Windows\SysWOW64\SubDir\Client.exe NEAS.665e38a9c0c37947cfe9d92290da2380.exe File opened for modification C:\Windows\SysWOW64\SubDir\Client.exe Client.exe File opened for modification C:\Windows\SysWOW64\SubDir Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1884 schtasks.exe 2016 schtasks.exe 1192 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2024 NEAS.665e38a9c0c37947cfe9d92290da2380.exe 2024 NEAS.665e38a9c0c37947cfe9d92290da2380.exe 2024 NEAS.665e38a9c0c37947cfe9d92290da2380.exe 2024 NEAS.665e38a9c0c37947cfe9d92290da2380.exe 2024 NEAS.665e38a9c0c37947cfe9d92290da2380.exe 1964 Client.exe 1964 Client.exe 1964 Client.exe 1964 Client.exe 1964 Client.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2024 NEAS.665e38a9c0c37947cfe9d92290da2380.exe Token: SeDebugPrivilege 1964 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1964 Client.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1884 2024 NEAS.665e38a9c0c37947cfe9d92290da2380.exe 29 PID 2024 wrote to memory of 1884 2024 NEAS.665e38a9c0c37947cfe9d92290da2380.exe 29 PID 2024 wrote to memory of 1884 2024 NEAS.665e38a9c0c37947cfe9d92290da2380.exe 29 PID 2024 wrote to memory of 1964 2024 NEAS.665e38a9c0c37947cfe9d92290da2380.exe 31 PID 2024 wrote to memory of 1964 2024 NEAS.665e38a9c0c37947cfe9d92290da2380.exe 31 PID 2024 wrote to memory of 1964 2024 NEAS.665e38a9c0c37947cfe9d92290da2380.exe 31 PID 1964 wrote to memory of 2016 1964 Client.exe 32 PID 1964 wrote to memory of 2016 1964 Client.exe 32 PID 1964 wrote to memory of 2016 1964 Client.exe 32 PID 1964 wrote to memory of 1192 1964 Client.exe 34 PID 1964 wrote to memory of 1192 1964 Client.exe 34 PID 1964 wrote to memory of 1192 1964 Client.exe 34 PID 1704 wrote to memory of 2636 1704 taskeng.exe 37 PID 1704 wrote to memory of 2636 1704 taskeng.exe 37 PID 1704 wrote to memory of 2636 1704 taskeng.exe 37 PID 1704 wrote to memory of 1752 1704 taskeng.exe 40 PID 1704 wrote to memory of 1752 1704 taskeng.exe 40 PID 1704 wrote to memory of 1752 1704 taskeng.exe 40 PID 1704 wrote to memory of 2836 1704 taskeng.exe 41 PID 1704 wrote to memory of 2836 1704 taskeng.exe 41 PID 1704 wrote to memory of 2836 1704 taskeng.exe 41 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.665e38a9c0c37947cfe9d92290da2380.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.665e38a9c0c37947cfe9d92290da2380.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows.Troubleshooter" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\NEAS.665e38a9c0c37947cfe9d92290da2380.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:1884
-
-
C:\Windows\SysWOW64\SubDir\Client.exe"C:\Windows\SysWOW64\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows.Troubleshooter" /sc ONLOGON /tr "C:\Windows\SysWOW64\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:2016
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "WINDOWSSYSTEMHOST" /tr "C:\Windows\SysWOW64\SubDir\Client.exe" /sc MINUTE /MO 13⤵
- Creates scheduled task(s)
PID:1192
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {544515F1-E7FD-4284-89A4-2B47A19A8735} S-1-5-21-1154728922-3261336865-3456416385-1000:TLIDUQCQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\SubDir\Client.exeC:\Windows\SysWOW64\SubDir\Client.exe2⤵
- Executes dropped EXE
PID:2636
-
-
C:\Windows\SysWOW64\SubDir\Client.exeC:\Windows\SysWOW64\SubDir\Client.exe2⤵
- Executes dropped EXE
PID:1752
-
-
C:\Windows\SysWOW64\SubDir\Client.exeC:\Windows\SysWOW64\SubDir\Client.exe2⤵
- Executes dropped EXE
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD5665e38a9c0c37947cfe9d92290da2380
SHA198088121719427b7e911c899f639ae007e624368
SHA256dd338ea97fec386923cdfecf3ff4aecac8ac51e494ba8c7e208a1ba51f8f0242
SHA5128e476e58f15f53807f7223b8d418177f3c4a6449713dadf9c20ed779c22f5d27ec47263dae698be3a2cfeb65c9db49d120d38301d47c2715ba9a440bb709190d
-
Filesize
344KB
MD5665e38a9c0c37947cfe9d92290da2380
SHA198088121719427b7e911c899f639ae007e624368
SHA256dd338ea97fec386923cdfecf3ff4aecac8ac51e494ba8c7e208a1ba51f8f0242
SHA5128e476e58f15f53807f7223b8d418177f3c4a6449713dadf9c20ed779c22f5d27ec47263dae698be3a2cfeb65c9db49d120d38301d47c2715ba9a440bb709190d
-
Filesize
344KB
MD5665e38a9c0c37947cfe9d92290da2380
SHA198088121719427b7e911c899f639ae007e624368
SHA256dd338ea97fec386923cdfecf3ff4aecac8ac51e494ba8c7e208a1ba51f8f0242
SHA5128e476e58f15f53807f7223b8d418177f3c4a6449713dadf9c20ed779c22f5d27ec47263dae698be3a2cfeb65c9db49d120d38301d47c2715ba9a440bb709190d
-
Filesize
344KB
MD5665e38a9c0c37947cfe9d92290da2380
SHA198088121719427b7e911c899f639ae007e624368
SHA256dd338ea97fec386923cdfecf3ff4aecac8ac51e494ba8c7e208a1ba51f8f0242
SHA5128e476e58f15f53807f7223b8d418177f3c4a6449713dadf9c20ed779c22f5d27ec47263dae698be3a2cfeb65c9db49d120d38301d47c2715ba9a440bb709190d
-
Filesize
344KB
MD5665e38a9c0c37947cfe9d92290da2380
SHA198088121719427b7e911c899f639ae007e624368
SHA256dd338ea97fec386923cdfecf3ff4aecac8ac51e494ba8c7e208a1ba51f8f0242
SHA5128e476e58f15f53807f7223b8d418177f3c4a6449713dadf9c20ed779c22f5d27ec47263dae698be3a2cfeb65c9db49d120d38301d47c2715ba9a440bb709190d