Analysis

  • max time kernel
    144s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2024 01:01

General

  • Target

    41c7c8c0a7bc7ba36889fa9de1bf5ad0_NEAS.exe

  • Size

    119KB

  • MD5

    41c7c8c0a7bc7ba36889fa9de1bf5ad0

  • SHA1

    bbc6c2f54372ddd9bac246d1935fb941a8b94a0e

  • SHA256

    7c1e17247e562a4e5e20db66031de2b23ba11f8044fe35dc064f4b51987d3c78

  • SHA512

    934fdd95763356f13d90fddc5f1f17ff1263cd8137eef2ead4e51c83c9f874833529bbd4684eb53e42eb143f5c2d2f5234e08bf3489cba5ba87763d918f8163c

  • SSDEEP

    3072:6OjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:6Is9OKofHfHTXQLzgvnzHPowYbvrjD/E

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41c7c8c0a7bc7ba36889fa9de1bf5ad0_NEAS.exe
    "C:\Users\Admin\AppData\Local\Temp\41c7c8c0a7bc7ba36889fa9de1bf5ad0_NEAS.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2648
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2828
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 744
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    a446ee7e3616d13a81ee5dac403a1b2e

    SHA1

    550d172bdce138da5d0e6b64e57cef8a755936a0

    SHA256

    64873d99da94bd5da97d20c2c1ce04ae3aee88803633d03b0249a2d54d1413e2

    SHA512

    daf5152635a45d25afab03adc515c310adbecc0cefdc71b72f5733bf5c504f3a40b777b43afb9da2b0997501106261b5c3c6a87bb695273407cc2efc8055d82f

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    aa08109e8351783ade7b5591e2b795a6

    SHA1

    e7e0da24719280deb3de2fd7082025b80e88ed04

    SHA256

    d9d3ebd32c9d67a0b2616b309c74614ab9671c6b6886dbb63476aadd81bd925f

    SHA512

    76674a778a7ed3980f44f5fea3e992cd4b50a1b3da00e0bb16b8d4cf037a89e35032eda5590b118ba66ccbba4f6582479cbb9f30cdbeeea28281723165bce7b7

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    12215d60a8266b46cec97b19a61ff7a4

    SHA1

    d79e6723990cc077414cf3c1d5b1763a02f1af41

    SHA256

    43634d22c05c6980fa033a865db71bb3d9fba241fc98eeb25b14951d3b153175

    SHA512

    ec1fab217a286610b97997dd2f4bbeef0fcd7ae36b48e71648c2563bce52d3295610079e386cdaa8f09e0f17bad324acd8c878e0bdbe7edf36151b23e8a31c67

  • \Windows\SysWOW64\smnss.exe

    Filesize

    119KB

    MD5

    bb61dd6f39b0f9914581cf2c97fd71a5

    SHA1

    b6555a1af6a841293f120be178194c5848cbfeba

    SHA256

    d31f51d0eba3f3fa88ef5f9dd1b99c230c7c88923cff7d46700ca12eacf6769a

    SHA512

    d3f62256830211cf609a2ba11e6d320651f8d6f03bbac9c35122eca3689cde26147eb8de59127efacfc3289111cb67020cdd50fa49ebb1b802f5d25e6629a6a5

  • memory/2648-27-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2828-33-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2828-40-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2828-46-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2964-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2964-16-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2964-18-0x00000000003C0000-0x00000000003C9000-memory.dmp

    Filesize

    36KB

  • memory/2964-26-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB