Analysis
-
max time kernel
134s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2023 16:26
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.30741d875486857f817f781a3c668412.exe
Resource
win7-20231023-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.30741d875486857f817f781a3c668412.exe
Resource
win10v2004-20231025-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
NEAS.30741d875486857f817f781a3c668412.exe
-
Size
50KB
-
MD5
30741d875486857f817f781a3c668412
-
SHA1
3bf47ec47e9d37f73643fb3e078cebc22e7549a0
-
SHA256
7e6f708756e36e9c3075ba5687381c1412cd139ed816d17cc101bf9aa43eafe8
-
SHA512
5113694da2152c01313abeb157aa4aba5beae99cc67751c298ffc2e8c7b9b0e9a6bf1d0e4e7f1d2f49e70fc2b5e01a08505a94d48d1035df684d2b8bc8091b8c
-
SSDEEP
768:7akFbk5BoY+cx7x+X0p42nFKRgu5SNF2B3j0mJMkn4LZSxFTk57TA0P9m0D:+kFbk5BoYFUOnUevNMTNn4gFTk57TVcq
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{43E3767C-ABB7-8B02-9403-704B1C3C8C96} NEAS.30741d875486857f817f781a3c668412.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{43E3767C-ABB7-8B02-9403-704B1C3C8C96}\stubpath = "%SystemRoot%\\system32\\vmtoolsd.exe" NEAS.30741d875486857f817f781a3c668412.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\vmtoolsd.exe NEAS.30741d875486857f817f781a3c668412.exe File created C:\Windows\SysWOW64\vmtoolsd.exe NEAS.30741d875486857f817f781a3c668412.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2728 NEAS.30741d875486857f817f781a3c668412.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2728 wrote to memory of 4704 2728 NEAS.30741d875486857f817f781a3c668412.exe 91 PID 2728 wrote to memory of 4704 2728 NEAS.30741d875486857f817f781a3c668412.exe 91 PID 2728 wrote to memory of 4704 2728 NEAS.30741d875486857f817f781a3c668412.exe 91 PID 2728 wrote to memory of 4444 2728 NEAS.30741d875486857f817f781a3c668412.exe 95 PID 2728 wrote to memory of 4444 2728 NEAS.30741d875486857f817f781a3c668412.exe 95 PID 2728 wrote to memory of 4444 2728 NEAS.30741d875486857f817f781a3c668412.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.30741d875486857f817f781a3c668412.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.30741d875486857f817f781a3c668412.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Active Setup\Installed Components\{43E3767C-ABB7-8B02-9403-704B1C3C8C96}" /f2⤵PID:4704
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\NEAS30~1.EXE > nul2⤵PID:4444
-