Analysis

  • max time kernel
    149s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2024, 16:03

General

  • Target

    d3e1140fa0b076e09d4a6cada7870420_NEAS.exe

  • Size

    72KB

  • MD5

    d3e1140fa0b076e09d4a6cada7870420

  • SHA1

    764ead5dfbb53b6a813e3c6c74407c22fa086bac

  • SHA256

    ddd662560be418472d3b0661a4d66f3b814ec0cb77dfa7c76dc3f52a36aaaad2

  • SHA512

    9e3834b84c549a14e80b01bce188f120c48ab3685d9958404b0a46212fb126ffccef86846b9a69c04e9beb3f37d4ecf2b21de4da03dd9e5c4467a2218eb74930

  • SSDEEP

    768:x/nlrF9TAbYmFr1BndWdhKjJFJLLeTYSOmPPxfXjGca8Iaxqm4Ts9s5qCfRpXMRZ:x5FNAlTnd+5rO0PxfXZVBZq5qYXMEG

Malware Config

Signatures

  • Windows security bypass 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Modifies WinLogon 2 TTPs 5 IoCs
  • Drops file in System32 directory 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:616
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:3488
        • C:\Users\Admin\AppData\Local\Temp\d3e1140fa0b076e09d4a6cada7870420_NEAS.exe
          "C:\Users\Admin\AppData\Local\Temp\d3e1140fa0b076e09d4a6cada7870420_NEAS.exe"
          2⤵
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:880
          • C:\Windows\SysWOW64\ixsiteam.exe
            "C:\Windows\SysWOW64\ixsiteam.exe"
            3⤵
            • Windows security bypass
            • Modifies Installed Components in the registry
            • Sets file execution options in registry
            • Executes dropped EXE
            • Windows security modification
            • Modifies WinLogon
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4440
            • C:\Windows\SysWOW64\ixsiteam.exe
              --k33p
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:4496

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\ekdirov-easac.exe

              Filesize

              73KB

              MD5

              5ff4e72eae0add66805c268f647f281d

              SHA1

              b3fd8eb2efef8fa43d577b67a7f58f89aed4289f

              SHA256

              764054a80da87238fa3bacd2a6e40f153836026593cf528191d467135309472d

              SHA512

              8ec2fa851e59a747da6b3dd043b975dd5f4b0060624695f6559c9c588f7b5af2633cce25e26c020cf6d525cac8cbdb1333f3570a3e17e70b588d795542338945

            • C:\Windows\SysWOW64\ifkimoap.exe

              Filesize

              72KB

              MD5

              4399828d94d7032a51e3cd5235f95022

              SHA1

              03771a5ce732959b7bfeaaaae0ed0935dc2eab48

              SHA256

              a9e26ba1d936b89d23dcfc372a683c8eda373f78f31c19c0e1bf09f2f6e831ad

              SHA512

              831dec8480a11847099268a13ecf61f43f3abd181afaf8b6882791542dad551a5cccdb19237d569754517ed839fc71cc9ef5aa237e0cad18bd2d305dab36a512

            • C:\Windows\SysWOW64\ihloaveh-dat.dll

              Filesize

              5KB

              MD5

              f37b21c00fd81bd93c89ce741a88f183

              SHA1

              b2796500597c68e2f5638e1101b46eaf32676c1c

              SHA256

              76cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0

              SHA512

              252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4

            • C:\Windows\SysWOW64\ixsiteam.exe

              Filesize

              70KB

              MD5

              e96b75479a1dcde2bb9d08fd345b3d8f

              SHA1

              407636c991f75df634591c3c75c67e79ad7f6f36

              SHA256

              b47dfad1060488946b63bd00c7cfa60d07b7b287adfdee327ab263d360d03a17

              SHA512

              18a2e65800517ce317166da4ea62fe829514b27cb2056f428c0c71d03648f8c37a2234f94614fa58cee41c370361e172b84f4a5beb55b57e69d201391c5b9266

            • memory/880-3-0x0000000000400000-0x0000000000403000-memory.dmp

              Filesize

              12KB

            • memory/4440-47-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/4496-48-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB