Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 05:36
Static task
static1
Behavioral task
behavioral1
Sample
747d8b874fe106199dca6682af1c4970_NEAS.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
747d8b874fe106199dca6682af1c4970_NEAS.exe
Resource
win10v2004-20240426-en
General
-
Target
747d8b874fe106199dca6682af1c4970_NEAS.exe
-
Size
224KB
-
MD5
747d8b874fe106199dca6682af1c4970
-
SHA1
71bfbcfce9febfbb2a30e0c36951778819285156
-
SHA256
b0ddcc2348ffcb31e426493648cd81c28d5426c7989a93142d33dd72d614c2d3
-
SHA512
9a3b097d649e7dd5a8544954b78b8c8c1400c23b45ffcf1c82ae044bcadb0e8819b4997d75b6b4d9705c2df3a395579c4eb62b59e94f7963e03f22486be9657b
-
SSDEEP
3072:j6JnHcFF+YupJ904AX+ipuvnHMC6Fz2Pa9VZumXYdVL63fZi8KGcI:U8FFk/at6PMFKa9VUuYdVL63fZNV
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 747d8b874fe106199dca6682af1c4970_NEAS.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xuuite.exe -
Executes dropped EXE 1 IoCs
pid Process 1972 xuuite.exe -
Loads dropped DLL 2 IoCs
pid Process 1044 747d8b874fe106199dca6682af1c4970_NEAS.exe 1044 747d8b874fe106199dca6682af1c4970_NEAS.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /D" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /d" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /o" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /b" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /L" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /K" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /P" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /t" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /l" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /n" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /g" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /i" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /V" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /e" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /N" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /a" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /X" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /B" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /A" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /W" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /p" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /T" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /k" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /o" 747d8b874fe106199dca6682af1c4970_NEAS.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /M" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /G" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /F" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /Z" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /x" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /s" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /f" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /H" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /w" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /c" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /v" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /z" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /O" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /u" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /J" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /Q" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /C" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /S" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /h" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /I" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /U" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /E" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /q" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /j" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /Y" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /m" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /R" xuuite.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuite = "C:\\Users\\Admin\\xuuite.exe /r" xuuite.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1044 747d8b874fe106199dca6682af1c4970_NEAS.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe 1972 xuuite.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1044 747d8b874fe106199dca6682af1c4970_NEAS.exe 1972 xuuite.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1044 wrote to memory of 1972 1044 747d8b874fe106199dca6682af1c4970_NEAS.exe 28 PID 1044 wrote to memory of 1972 1044 747d8b874fe106199dca6682af1c4970_NEAS.exe 28 PID 1044 wrote to memory of 1972 1044 747d8b874fe106199dca6682af1c4970_NEAS.exe 28 PID 1044 wrote to memory of 1972 1044 747d8b874fe106199dca6682af1c4970_NEAS.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\747d8b874fe106199dca6682af1c4970_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\747d8b874fe106199dca6682af1c4970_NEAS.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\xuuite.exe"C:\Users\Admin\xuuite.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD52916c650fec864adccdbd0977622a49a
SHA108542d2727252f8a3768e3a482dca6ec60ca582c
SHA256d988e1d86bf0f6823275586d81c49a0b851ab068aa11aeaa06d3397496f099c4
SHA512e6d45f41131aa19b6496aef8f07f9414217e683844ba7a3adbe1b2f0a41bb3f5809e0e41d5ee918efb3b0aaab622929f31e0ebc21b16621d8bf40f17cdcf6759