General
-
Target
443a0e5d4fd3546d73e21a47f66b237d_NEAS
-
Size
91KB
-
Sample
240507-wrrrjshb4y
-
MD5
443a0e5d4fd3546d73e21a47f66b237d
-
SHA1
8510917af9691cc8505ece890b7100626190f257
-
SHA256
d8a6f3c1d32f0f65681a63298d24c9357432c5f9ecfebaa68a13845cf1e5deb9
-
SHA512
b7120712310692c835834cf5fb620c3ff9af3423980f3d6bb3b4a8d72b2a839fc33a05b965258b1b28980d769c0551452788ccc00e0b6704b245a04dd54d5c46
-
SSDEEP
768:E3gRYjXbUeHORIC4ZxBMldNKm8Mxm8I+IxrjPfAQ4o3Imu+33gRYjXbUeHORIC4f:uT3OA3+KQsxfS4VBT3OA3+KQsxfS4N
Static task
static1
Behavioral task
behavioral1
Sample
443a0e5d4fd3546d73e21a47f66b237d_NEAS.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
443a0e5d4fd3546d73e21a47f66b237d_NEAS.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
443a0e5d4fd3546d73e21a47f66b237d_NEAS
-
Size
91KB
-
MD5
443a0e5d4fd3546d73e21a47f66b237d
-
SHA1
8510917af9691cc8505ece890b7100626190f257
-
SHA256
d8a6f3c1d32f0f65681a63298d24c9357432c5f9ecfebaa68a13845cf1e5deb9
-
SHA512
b7120712310692c835834cf5fb620c3ff9af3423980f3d6bb3b4a8d72b2a839fc33a05b965258b1b28980d769c0551452788ccc00e0b6704b245a04dd54d5c46
-
SSDEEP
768:E3gRYjXbUeHORIC4ZxBMldNKm8Mxm8I+IxrjPfAQ4o3Imu+33gRYjXbUeHORIC4f:uT3OA3+KQsxfS4VBT3OA3+KQsxfS4N
Score10/10-
Modifies WinLogon for persistence
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Disables RegEdit via registry modification
-
Disables use of System Restore points
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
6