Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 14:48
Static task
static1
Behavioral task
behavioral1
Sample
26d742cb384f01def7edf82818fbfc3c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
26d742cb384f01def7edf82818fbfc3c.exe
Resource
win10v2004-20231215-en
General
-
Target
26d742cb384f01def7edf82818fbfc3c.exe
-
Size
82KB
-
MD5
26d742cb384f01def7edf82818fbfc3c
-
SHA1
ce32a7d706317c492d1792a1c29dd1bf46e09407
-
SHA256
98c3a8de31df0c8f2d5063259159a6d02b594d150684b753ed84db218b01ea84
-
SHA512
080474471a5a82737c7a5dd4f70cec8c3bcc5ed1fcec1b387bfd35a54e29e871443103f65f93944c6c55d74464681c0f7835c5cd3cd1ef0c1479d9db7232b4d5
-
SSDEEP
1536:GzanVq7Nvsb2KFWh1GGfLmStHrhvHG/efUnLp1GMQXt1rA/iSzVl1ewBQULKM/5R:GzeVq1q/F01GYLhEBnLeMq9A/RZz7W4d
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2768 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2844 neos.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\neos = "C:\\Windows\\neos.exe" 26d742cb384f01def7edf82818fbfc3c.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\neos.exe 26d742cb384f01def7edf82818fbfc3c.exe File opened for modification C:\Windows\neos.exe 26d742cb384f01def7edf82818fbfc3c.exe File created C:\Windows\crock+mock.config neos.exe File opened for modification C:\Windows\crock+mock.config neos.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2844 2512 26d742cb384f01def7edf82818fbfc3c.exe 18 PID 2512 wrote to memory of 2844 2512 26d742cb384f01def7edf82818fbfc3c.exe 18 PID 2512 wrote to memory of 2844 2512 26d742cb384f01def7edf82818fbfc3c.exe 18 PID 2512 wrote to memory of 2844 2512 26d742cb384f01def7edf82818fbfc3c.exe 18 PID 2844 wrote to memory of 2768 2844 neos.exe 20 PID 2844 wrote to memory of 2768 2844 neos.exe 20 PID 2844 wrote to memory of 2768 2844 neos.exe 20 PID 2844 wrote to memory of 2768 2844 neos.exe 20 PID 2844 wrote to memory of 1200 2844 neos.exe 21 PID 2844 wrote to memory of 1200 2844 neos.exe 21 PID 2844 wrote to memory of 1200 2844 neos.exe 21 PID 2844 wrote to memory of 1200 2844 neos.exe 21 PID 2844 wrote to memory of 2136 2844 neos.exe 25 PID 2844 wrote to memory of 2136 2844 neos.exe 25 PID 2844 wrote to memory of 2136 2844 neos.exe 25 PID 2844 wrote to memory of 2136 2844 neos.exe 25 PID 2136 wrote to memory of 2816 2136 w32tm.exe 31 PID 2136 wrote to memory of 2816 2136 w32tm.exe 31 PID 2136 wrote to memory of 2816 2136 w32tm.exe 31 PID 2136 wrote to memory of 2816 2136 w32tm.exe 31 PID 1200 wrote to memory of 2812 1200 w32tm.exe 32 PID 1200 wrote to memory of 2812 1200 w32tm.exe 32 PID 1200 wrote to memory of 2812 1200 w32tm.exe 32 PID 1200 wrote to memory of 2812 1200 w32tm.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\26d742cb384f01def7edf82818fbfc3c.exe"C:\Users\Admin\AppData\Local\Temp\26d742cb384f01def7edf82818fbfc3c.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\neos.exe"C:\Windows\neos.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set allowedprogram "C:\Windows\neos.exe" enable3⤵
- Modifies Windows Firewall
PID:2768
-
-
C:\Windows\SysWOW64\w32tm.exew32tm /config /syncfromflags:manual /manualpeerlist:time.windows.com,time.nist.gov3⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\system32\w32tm.exew32tm /config /syncfromflags:manual /manualpeerlist:time.windows.com,time.nist.gov4⤵PID:2812
-
-
-
C:\Windows\SysWOW64\w32tm.exew32tm /config /update3⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\system32\w32tm.exew32tm /config /update4⤵PID:2816
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5d1c9d8227f89159fd1e8d8b764154cc7
SHA12055f923caf61e3523f8748926e6d4d19aea128f
SHA256ab670c48dba8250c3f0ee1728a303091c5e13c257b878e0d4044f483411ea476
SHA512c53d82af80db8deb3c911ce6b02ef4c339add257bc78e8674cc6d1ce012bb49f9d66edabe36494a2495615c4ed8d77b53135bd77a86e92cdc0ca200ef5ad16fc
-
Filesize
4KB
MD597344f399e03af049746392c0977ccca
SHA1c4b8d20c800ee1361c7eae70cfe756330af570c9
SHA256c38a5b8eed50ee575b6d22ac158024faa85a9700b8d1fa1603e04f4087adc5f9
SHA5121ba10c7ae9044dae9577da3625fdbbcdab3a5847eee1e22c9bd68bb6eae1e48795a2b080114df2ff8dfb29630f887ae93487a66deb509bbbd90fbd4cef396db3
-
Filesize
82KB
MD526d742cb384f01def7edf82818fbfc3c
SHA1ce32a7d706317c492d1792a1c29dd1bf46e09407
SHA25698c3a8de31df0c8f2d5063259159a6d02b594d150684b753ed84db218b01ea84
SHA512080474471a5a82737c7a5dd4f70cec8c3bcc5ed1fcec1b387bfd35a54e29e871443103f65f93944c6c55d74464681c0f7835c5cd3cd1ef0c1479d9db7232b4d5