Analysis

  • max time kernel
    144s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2024, 23:17

General

  • Target

    2ebf753c0a60d8bc21de31b1a6ea0c10_NEAS.exe

  • Size

    224KB

  • MD5

    2ebf753c0a60d8bc21de31b1a6ea0c10

  • SHA1

    5baadb15c4a31d714df6e1c4fae9cbaa44f87ce2

  • SHA256

    51b446d748bcfc639b05dd75789880bb28eda7c8be4f5b40bb3138e118d2988e

  • SHA512

    04f4d211db451fa910af964eae463073ef36f90147d9657d8c506604b9b806a1ab959d8f52ab824e1ba52303045bdd609d03776814dbf43152ec3eda10d1d94a

  • SSDEEP

    6144:wIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCtZy:pKofHfHTXQLzgvnzHPowYbvrjD/L7QPo

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ebf753c0a60d8bc21de31b1a6ea0c10_NEAS.exe
    "C:\Users\Admin\AppData\Local\Temp\2ebf753c0a60d8bc21de31b1a6ea0c10_NEAS.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 832
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2920

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\satornas.dll

          Filesize

          183B

          MD5

          658bb639aeefc79c30b6ad9f2f6334ee

          SHA1

          bbc4bbb53468474eac3144984ae54cfa57ff398a

          SHA256

          9657e4c0be7f38eb5f3135b8296f233f429b5ec1f0f3eed903e86843c0b0ab8b

          SHA512

          c5387efd5a1d30b1812aef53e020cc6b8bc2a4c220b24330d4aa217d9bad57b13f79910845e6d4445180a82cc97bc7e4789f03faef84e330077802b3651dacf5

        • \Windows\SysWOW64\ctfmen.exe

          Filesize

          4KB

          MD5

          536c3a172d95848ab1f8e4dd533ca2ad

          SHA1

          b637ebcf898de02afb097c51e7d4749ddd9181d0

          SHA256

          a5ccfdf382ddae4ea4164f367c1826f84d553f58cf3e9dc0b9961f5d8a1ede7f

          SHA512

          6d24491bb34d31d88674976915df556ad190261e28aeeb2ec60016fe331ed92baabe8c6405fde1dee4742ea9f779a32d01dbe7f4ce35c96ab5216cd320734b93

        • \Windows\SysWOW64\shervans.dll

          Filesize

          8KB

          MD5

          7380f2e43b19418e919f9bd6a5aba421

          SHA1

          48dbfc68af2c90e6ef8085020a60d7f4c3516ef2

          SHA256

          e322a199332550b5c673620fe6595d218e1735ad29627bd1f2e8d208379bce6f

          SHA512

          7e4521bb9259d9f1986e5c8bce7cd57a12a379485539497ca1bceb3d5510d4a03afb7cd8f24bd19dd23c4e73371ff8d0838d5e0e6e2a2484fe241cc776305eb4

        • \Windows\SysWOW64\smnss.exe

          Filesize

          224KB

          MD5

          6eebb8e6256f039f902d7c0bf2508cab

          SHA1

          add54e2fa365158514714e9933c33f812ba340f7

          SHA256

          11fd9e175928f43484fc68753a382b96f8cacf1b8bc94aeb84f14bee7d052917

          SHA512

          6dd5a207dd9b9e411896e0e3f157c07cb292c7174d54da5a9d8968d684298a267ddabef5122fe2f77665a92467e43c3b6967c265b1b6d51191a19f165485cee3

        • memory/2080-26-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/2080-25-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/2080-0-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/2080-18-0x0000000000340000-0x0000000000349000-memory.dmp

          Filesize

          36KB

        • memory/2080-16-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/2592-31-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/2656-33-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/2656-40-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/2656-46-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB