Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
17/11/2023, 19:58
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.19a58f81b02199879dc32323dcd079b0.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.19a58f81b02199879dc32323dcd079b0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.19a58f81b02199879dc32323dcd079b0.exe
-
Size
211KB
-
MD5
19a58f81b02199879dc32323dcd079b0
-
SHA1
202bab4b8926c0462b383fce99f848c6a601fed3
-
SHA256
a52fdfb6ccf0200b9ebcb2c313c37e52bc066612a0be860dd24a8ea56b772ed8
-
SHA512
963beec0654bf293b589db3e3f42fb84d21803703a5d5ad719b3f52c08a4d9a497fcccc03fed16d59e972f5b661ca87d90e4759d721f80698a5b8d7bf5184612
-
SSDEEP
3072:JD6Xtx68yygRBE52mxkEOHLRMpZ4deth8PEAjAfIbAYGPhz6sPJBInxZqO0:Jh8cBzHLRMpZ4d1Z0
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" swchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" userinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" swchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" userinit.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2744 userinit.exe 2740 spoolsw.exe 2676 swchost.exe 2712 spoolsw.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" swchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\system\udsys.exe userinit.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\spoolsw.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe spoolsw.exe File opened for modification \??\c:\windows\userinit.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe swchost.exe File opened for modification \??\c:\windows\userinit.exe NEAS.19a58f81b02199879dc32323dcd079b0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2428 NEAS.19a58f81b02199879dc32323dcd079b0.exe 2744 userinit.exe 2744 userinit.exe 2744 userinit.exe 2676 swchost.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe 2744 userinit.exe 2676 swchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2744 userinit.exe 2676 swchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2428 NEAS.19a58f81b02199879dc32323dcd079b0.exe 2428 NEAS.19a58f81b02199879dc32323dcd079b0.exe 2744 userinit.exe 2744 userinit.exe 2740 spoolsw.exe 2740 spoolsw.exe 2676 swchost.exe 2676 swchost.exe 2712 spoolsw.exe 2712 spoolsw.exe 2744 userinit.exe 2744 userinit.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2744 2428 NEAS.19a58f81b02199879dc32323dcd079b0.exe 29 PID 2428 wrote to memory of 2744 2428 NEAS.19a58f81b02199879dc32323dcd079b0.exe 29 PID 2428 wrote to memory of 2744 2428 NEAS.19a58f81b02199879dc32323dcd079b0.exe 29 PID 2428 wrote to memory of 2744 2428 NEAS.19a58f81b02199879dc32323dcd079b0.exe 29 PID 2744 wrote to memory of 2740 2744 userinit.exe 30 PID 2744 wrote to memory of 2740 2744 userinit.exe 30 PID 2744 wrote to memory of 2740 2744 userinit.exe 30 PID 2744 wrote to memory of 2740 2744 userinit.exe 30 PID 2740 wrote to memory of 2676 2740 spoolsw.exe 31 PID 2740 wrote to memory of 2676 2740 spoolsw.exe 31 PID 2740 wrote to memory of 2676 2740 spoolsw.exe 31 PID 2740 wrote to memory of 2676 2740 spoolsw.exe 31 PID 2676 wrote to memory of 2712 2676 swchost.exe 32 PID 2676 wrote to memory of 2712 2676 swchost.exe 32 PID 2676 wrote to memory of 2712 2676 swchost.exe 32 PID 2676 wrote to memory of 2712 2676 swchost.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.19a58f81b02199879dc32323dcd079b0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.19a58f81b02199879dc32323dcd079b0.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
\??\c:\windows\userinit.exec:\windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\windows\swchost.exec:\windows\swchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD52b17900a9c444c60cd2d4fa9aadc4836
SHA121a69110d02c1cbdb02f721f2b8974d54085bb51
SHA256d5fa2e9fd0bda8b097881df0a6f15524fe44523fbeb997f0faae9df5cdb930d5
SHA5129a858ea6f634cf411b947dfae203d454cfe53de6c9990f965860d90871a2426df925ea915dd5ea5b7af80eb36efa429ec396ac7a5eb7276019bfaa6b114f6e2c
-
Filesize
211KB
MD5fafa524cf661c42bdcd2b5270ccc1d21
SHA1688149fd59bea4f269fdc8f51e5ed7d51a0f23d7
SHA256b0c646bad73d7a146f0961cb63a9239b0e8bc6a978e461f9c9642b72dde580d3
SHA5121a4ec3e6bdde3fb221844409a0d85086b5dc4cf6ef20ba143909854335e6bb61079e9530e7bfb690937fa63cb451112bca538cc6f561420af613aaa6a22c740a
-
Filesize
211KB
MD5fafa524cf661c42bdcd2b5270ccc1d21
SHA1688149fd59bea4f269fdc8f51e5ed7d51a0f23d7
SHA256b0c646bad73d7a146f0961cb63a9239b0e8bc6a978e461f9c9642b72dde580d3
SHA5121a4ec3e6bdde3fb221844409a0d85086b5dc4cf6ef20ba143909854335e6bb61079e9530e7bfb690937fa63cb451112bca538cc6f561420af613aaa6a22c740a
-
Filesize
211KB
MD57f9c599d9bad1690f41902a3f1fd3675
SHA19f220b7ab485ca9fdb806841fe4cdd20f8c9ba6b
SHA256bffcaf49b5ba9dd9b4703fb65f5b3b4665cbf8e9e9b4494a1d6fa11772f7726b
SHA5120e9d88892b6f953660bcfbf73c203368ccce3e4620434340a7d703212cadbefd1dfb439a5018db70c52d1451c457bc7af99d7d961b7c9099a568e648cb59289e
-
Filesize
211KB
MD5d435e18aac38195433a0972ca1c333f0
SHA12c381ed74392e081c544f3d6f9aee16ac9297a0a
SHA2567be7774f8f40ebcd89ad64bf14bf044a12bc7c16ee8476ea8318d3a65a2bd528
SHA5127504dd9eaf7e5eda5ddc7d02855c31a5e6f7398832346c3d3f664148fb3a84ca99939cbe274a9a1971fdd7919696f79a075bb9d576f7a9c3e4c3a90c2a7dd4ab
-
Filesize
211KB
MD5d435e18aac38195433a0972ca1c333f0
SHA12c381ed74392e081c544f3d6f9aee16ac9297a0a
SHA2567be7774f8f40ebcd89ad64bf14bf044a12bc7c16ee8476ea8318d3a65a2bd528
SHA5127504dd9eaf7e5eda5ddc7d02855c31a5e6f7398832346c3d3f664148fb3a84ca99939cbe274a9a1971fdd7919696f79a075bb9d576f7a9c3e4c3a90c2a7dd4ab
-
Filesize
211KB
MD5fafa524cf661c42bdcd2b5270ccc1d21
SHA1688149fd59bea4f269fdc8f51e5ed7d51a0f23d7
SHA256b0c646bad73d7a146f0961cb63a9239b0e8bc6a978e461f9c9642b72dde580d3
SHA5121a4ec3e6bdde3fb221844409a0d85086b5dc4cf6ef20ba143909854335e6bb61079e9530e7bfb690937fa63cb451112bca538cc6f561420af613aaa6a22c740a
-
Filesize
211KB
MD57f9c599d9bad1690f41902a3f1fd3675
SHA19f220b7ab485ca9fdb806841fe4cdd20f8c9ba6b
SHA256bffcaf49b5ba9dd9b4703fb65f5b3b4665cbf8e9e9b4494a1d6fa11772f7726b
SHA5120e9d88892b6f953660bcfbf73c203368ccce3e4620434340a7d703212cadbefd1dfb439a5018db70c52d1451c457bc7af99d7d961b7c9099a568e648cb59289e
-
Filesize
211KB
MD5d435e18aac38195433a0972ca1c333f0
SHA12c381ed74392e081c544f3d6f9aee16ac9297a0a
SHA2567be7774f8f40ebcd89ad64bf14bf044a12bc7c16ee8476ea8318d3a65a2bd528
SHA5127504dd9eaf7e5eda5ddc7d02855c31a5e6f7398832346c3d3f664148fb3a84ca99939cbe274a9a1971fdd7919696f79a075bb9d576f7a9c3e4c3a90c2a7dd4ab