Analysis

  • max time kernel
    141s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 13:54

General

  • Target

    ad776259d712fdb20b156acc81ab3e50_NEAS.exe

  • Size

    2.7MB

  • MD5

    ad776259d712fdb20b156acc81ab3e50

  • SHA1

    3c7c1c5de09ea67e66de72c1cfde69e9382a9a61

  • SHA256

    f82d4bf4efdd54d7ca7091251111eb60f87841ed2ed828d2f3ebbd285f703dfb

  • SHA512

    4fea0c1613b4c49e2164f9822e566c9fb5db574d48f3fe29aef78d015ac6e1ab2f8c662e3fcc2fa7764d603119c9654952123db547450b44ccfcd610bd494604

  • SSDEEP

    49152:gQ+ojX8A3wd8nnSvED5bTChxKCnFnQXBbrtgb/iQvu0UHOaYmL7:gaX8A3wSnnT56hxvWbrtUTrUHO2n

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad776259d712fdb20b156acc81ab3e50_NEAS.exe
    "C:\Users\Admin\AppData\Local\Temp\ad776259d712fdb20b156acc81ab3e50_NEAS.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Users\Admin\AppData\Local\Temp\@AEC50.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\@AEC50.tmp.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:848
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat" "
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2236
          • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            PID:2548
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
          4⤵
            PID:2836
        • C:\Users\Admin\AppData\Local\Temp\ad776259d712fdb20b156acc81ab3e50_NEAS.exe
          "C:\Users\Admin\AppData\Local\Temp\ad776259d712fdb20b156acc81ab3e50_NEAS.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3032
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" http://suggest.se.360.cn/sedoctor?ctype=se&cversion=
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2956
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:2
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2404

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a207275fac751c776f9e9af62ea25095

      SHA1

      86c232b8e6538b480f6cac44c9ec00a0d6102dec

      SHA256

      ff3b9ac5ecc96ce256c9d490931fdb9e64a9132a1a12f0974e43545d324f359f

      SHA512

      40c63f4ae9897c23134f5f124f2a57e68911130e2e8b64b7d0a0134a1c07ed468f30cabb790eb0eced41e069aac6f8adc7e9a8a5549e0552b3bea20f6038e726

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      5cb038a1b9ad9635d0b38443c4e919bb

      SHA1

      fcb2b9e5d8fa8e1f9ee3e6d86625ab09b50f87ff

      SHA256

      103f5adf2c3f72b3a0097b6e2db71ef5025d184984b3a8840440709f5c81ddb5

      SHA512

      e4db60c705a15ef61747cbe7eb7da32ef20b5aea6610f4036a25a0892929c897d1a02de9dee2417bf35304ee57b92a6f828ff24f4436b227825add3929fb145b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c9407de454c27ea4b54198c97aff506e

      SHA1

      8cdecc4a3f9111c8be14d5e99382949a9aff52e4

      SHA256

      615cf954e317619643568b24a4d8b701795b9de7d95e178cb0176ecb9e265960

      SHA512

      80e61344698944fa49745568f17ee283e6e1cc04c401bc1abeab0b8cf60bb03c7d04c4eeb3bfbd1f6cde11fcbe28468cfe013cade064db5415190baafdf720b4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      802c052aa5d49f463f4c9ccbdf8b7049

      SHA1

      8b1fe0b2ce227fa8f723d39d4cf84864521fb584

      SHA256

      244be8badd27b3c5841d0bb78b0ee9e6baf67612fabd6a24c00a206ee0a36909

      SHA512

      cfd6f222b1142b75a7f4984918ef4bf1e2da638da271f1921031c2e99c68a88bf6e81da486a3b86a83f306acc7cb2192c37ddf1c10051dedade68b2eb062e8c7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4712d6a1c42be8e10cae83d7b78e614b

      SHA1

      72a348701efa93a914a1370d67688c9fda49a4e1

      SHA256

      5a5ab9c75c50a32b70792fa4dae4dba4e0bd13aa5e4f1bf0a15c6ee5d0d6c92b

      SHA512

      f379e67dba73983f451b279041afdb43bcbff6222e812823553431956cc2ef8eb19ab4f4d2f3e27dd14b566dc4ed7c0dc811627ffe121891dc5417e857f4e6ee

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      69a97d511bde474b30568fe2303ddf0b

      SHA1

      a61cfdb948fdd6675234e93ccf47bdb11ec0c80d

      SHA256

      a9578571a73d429fe611879733733767239e970ae99f3b3a52cc3b672fd2fc16

      SHA512

      ba571adf48f10f4cbd149c9ecc735f288615761c64cf6c1002c6b449afcaf8cf1d7ecccf554d9705956cc00a1527584d5d89fea5573fe999b095b1d756bb7c22

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      88cd2fdee54e6448f8471d470759c56d

      SHA1

      bfd82db9718077a0ada008867ab3080a509727ab

      SHA256

      87fe7c32f5068cccec07555e8a29941d916e9ea44a953b4b687aed15fc88a66e

      SHA512

      1111fe2f6c7edb0ee25d9a3e25d844d164f8b8ad8b6fec1c053b29ae59a068e68e0d8278fe9f1e620dabf5df68d0105171c43517148578cfe2ddf79d7de18164

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      cfbfce0fcd978195ec889db112ea124a

      SHA1

      2e1fdffef9c8e772fef9545df9f1374a06abf2ba

      SHA256

      798f3d96fa49951f9f21266d61062adf5c2140fcebcc03755d9028fd280204d4

      SHA512

      0efe7f7968963bd5fe8cc914f647d0f923d916deb10fde04a85d3822bc8b0aaff15a738ddce0daa3c2e1cd08b35766b6ec244c1d2794aab690ae97b1625a31d6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      df10acb32fa0e2b62925a263140888f9

      SHA1

      e1b545f105e026e4dcbe631663bae6711b62d5a2

      SHA256

      57d6f63c2c3feb0e76605ef84d8df4052d2f45fb9afccfe2defe0b0becfb3376

      SHA512

      a940da2dc500a0cc8fd7f5600779b910a7767e57723661f3c98f7dfecf9da7685da343369cc7159b36f84824e470df14b939e7ef6b913b6f4afcb8571e487752

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      fbe552bbb52efbe7d4085ccf58d43138

      SHA1

      d4324d1d77b268b994417ad06b36b34e8c212539

      SHA256

      21e03019242cba0b9119f35e850f461858e100fb092885bde165dd3932d0db8e

      SHA512

      9e13a19e12fe656c3b4c6931e27f00f181d874568132721a729f84177a5f4dff2acc7c0f322c419e31e62f97809b89d595a273921ab687ab172a40decfc4c861

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      69a3acd6be5abc888931364545a4f353

      SHA1

      5897fb245760cd5256afa24eacef5793c99f12a3

      SHA256

      5a2aeb3bff9eec2a0fba930638e626806a39ca66c45b48890e85c1545e0555c8

      SHA512

      4ed4acf8a4b5d949c66f75a1996ab609a7bc3185289e8f3eab0bd20f1804d64ff54be9d8866c7d10c33ae94c9971e40a472e2c88512d715466341cd5752b56c3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d65c445564566f67b1eb166a258d2db0

      SHA1

      53c3db7883b135d0e87442277b6d777c68c996a2

      SHA256

      923be841edd8b448b4ba7489e6b6999fcc1f20744f11f57353900c63c3d50d76

      SHA512

      42a5b67418a113767a9b81502c46d2d873d7673644878b10a70af0fa739b3fc0a49867febe9670aaced18bfed0fd2eb6c0b22c8fea9ea1ecc6b5728be055012f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      78cf9a17ab30aac2513059112b15223e

      SHA1

      2d8e069751f35911c1b618ad63f2deaaec13ef3f

      SHA256

      05f58769eec434538e159566879f7ec8670be89ca7ed41197ef2847ef9cf4bc4

      SHA512

      6622cc92b87b440c7a197678ab2d8c44a95922ae1f77006c836c04d3ddc3cc7610f501e38ec61d0d48503da1dace8b7a64e167fb21ccd3487020673d0e50a899

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      090d114d9956b279eb1023a921d9294c

      SHA1

      07b59ce5429e500da613b537f5178cab21f8706d

      SHA256

      64efb8c2bc0d4ea712e5f8a0feadf959d1f8a60c16443d7ff019def1e9858dd4

      SHA512

      7a11ef578ae8ed1fce787f78c99d4707f581b0f05c92752d1ee7b25dbe4ef8367b0498789aacc0fc3140778f443ed70f22e07739e574b458cfdbdd4c04151a26

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c23de9ca9e16dc81eb7a233bcdcb6458

      SHA1

      9475ab36df04804e0feccf926bb46854b6ab1605

      SHA256

      7596d1487984a1435b24fc212d8802fec90e7ee9ba9790e1b8f487692ef6d6e9

      SHA512

      4f440448229aedea760b60bd8dbb13523d64534f8c3d782dc746c3d30e6a5c9a6c8ca089f8d5f5822c582dc43c4204c64f46389d706aaa01438f31b989890dab

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ea472fefd07a1cab031f050ac0415ec6

      SHA1

      438bb4b0aa44f825657d5528697dc5f3a8228ee1

      SHA256

      cc257d25de1e38f7cceb29150f5731f65ffadaf4076d3234a791a30e77bd6249

      SHA512

      d0a52563d48f3fece292b73a99048db15359a04a51b370b556dde39c13eb659265e260619febf97e2422fb5f17b493b3d4d7ad9bd23b0a48244660e4fa8e1930

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      5a2d53cfc2d0d26a6ffe096be6fc73b4

      SHA1

      3d7ae1d191b121d43d4234c216c04a66785e25d8

      SHA256

      bdadfa328e5c1130d91f6e0f3eefebce7486f1b907441d606d215c74f9862ed7

      SHA512

      9935f7a9faa96859c6bf27d4a3caf6e5dca76bd94a448cdef23be0faf4f33b2316782d733569c9939e9a65f2bc2d98b2eea63e8dde7ca25ee8ab214bb280f59e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      96421b1438d6a65a89325ac894dcba89

      SHA1

      ce11d1cdf1f5008b1947922479b57027688e7206

      SHA256

      df03a12a82a7d1e7ac7ae87646012b5a2be5dc5ce7b5fbe02bbb204b921fcffd

      SHA512

      4ce91cc70c59aa40ea7c751ad341b3c0b46fc086e35e1a8d74eb7abc440992e77f34975c1f193903b5e9dc7bd749ad93078de2a8d97bdd776e068c05630ce4c0

    • C:\Users\Admin\AppData\Local\Temp\CabE6B8.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\TarE7BA.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\ad776259d712fdb20b156acc81ab3e50_NEAS.exe

      Filesize

      961KB

      MD5

      b8d6ce61f1e8311110687dcd216f3cba

      SHA1

      206d2dffa332bec6af1cd19f5f9dbb294d8c6789

      SHA256

      85c154309ace3b02823d7127dd5e817997905b9ae58d6a8d60a3e5c26bd92643

      SHA512

      e96a9c41ef41b5b976f50c941dc69350d6cd917395f5d5ede4957a4f93d0057b07c77d14531e233667cddbe9b15cfe782b74da1c2d9be7a553f7be7a14db976f

    • C:\Users\Admin\AppData\Local\Temp\tmpED0.tmp

      Filesize

      1.0MB

      MD5

      df2c63605573c2398d796370c11cb26c

      SHA1

      efba97e2184ba3941edb008fcc61d8873b2b1653

      SHA256

      07ffcde2097d0af67464907fec6a4079b92da11583013bae7d3313fa32312fe8

      SHA512

      d9726e33fcfa96415cc906bdb1b0e53eba674eaf30ed77d41d245c1c59aa53e222246f691d82fa3a45f049fbf23d441768f9da21370e489232770ad5ae91d32f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe

      Filesize

      1.7MB

      MD5

      5f949ee75825672d5a5eae4b9cca8f56

      SHA1

      b74084cf9477861b6715e1ac1e106f9d11e9c6d6

      SHA256

      c269df8fb0e7a7d115e9c742761836f8a314ec0c3aeac2930d640bbfe7072a81

      SHA512

      ff10a81401139e174e6ab445e6f509753e2ed3991f2ff1e47cee0a43aea2fb2186fd064f646bd70a32e12e9aa83e3ceb7090f637a910b98f1e36809a4118f6cc

    • C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat

      Filesize

      129B

      MD5

      d1073c9b34d1bbd570928734aacff6a5

      SHA1

      78714e24e88d50e0da8da9d303bec65b2ee6d903

      SHA256

      b3c704b1a728004fc5e25899d72930a7466d7628dd6ddd795b3000897dfa4020

      SHA512

      4f2b9330e30fcc55245dc5d12311e105b2b2b9d607fbfc4a203c69a740006f0af58d6a01e2da284575a897528da71a2e61a7321034755b78feb646c8dd12347f

    • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

      Filesize

      194B

      MD5

      83320533cd50ff330ddf9c9ccc8e53c4

      SHA1

      b31ca7b6c926d182598f2e8be4645fa1d1c0e72c

      SHA256

      59d1df06f90e1a0af242f0143ed3417f301a33503c961773136818501f0055ec

      SHA512

      cbe95e0f3ce76f0d02ace0d131e7f47242f9eabcaab64880ac9b1d38efdd8c203480e35dc74fe3a93b90840270e1d44bd9af7cee2606c450eadb65f38a550bf3

    • \Users\Admin\AppData\Local\Temp\@AEC50.tmp.exe

      Filesize

      1.7MB

      MD5

      a55193f93137e304e161852ce3a6ef02

      SHA1

      05284fc2080cfbcd1a7e8d5a1be14fb1773017d0

      SHA256

      4aef31afecebd4f092e3f5c7a9a33954e07e21a56d5c7c99ad9a8b064dc90723

      SHA512

      6d40260940be59f53ed4f575a72b57f61b5255fdf005267b8037ce1547c81d38cb375366bd469fd715982c9004882a0284282e4e3fe380e6f4d2e4189b76ac5a

    • \Users\Admin\AppData\Roaming\Temp\mydll.dll

      Filesize

      202KB

      MD5

      7ff15a4f092cd4a96055ba69f903e3e9

      SHA1

      a3d338a38c2b92f95129814973f59446668402a8

      SHA256

      1b594e6d057c632abb3a8cf838157369024bd6b9f515ca8e774b22fe71a11627

      SHA512

      4b015d011c14c7e10568c09bf81894681535efb7d76c3ef9071fffb3837f62b36e695187b2d32581a30f07e79971054e231a2ca4e8ad7f0f83d5876f8c086dae

    • memory/848-16-0x0000000010000000-0x0000000010015000-memory.dmp

      Filesize

      84KB