Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 18:42
Static task
static1
Behavioral task
behavioral1
Sample
01355f5fa4feef09e0cc082244e2c250_NEAS.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
01355f5fa4feef09e0cc082244e2c250_NEAS.exe
Resource
win10v2004-20240419-en
General
-
Target
01355f5fa4feef09e0cc082244e2c250_NEAS.exe
-
Size
264KB
-
MD5
01355f5fa4feef09e0cc082244e2c250
-
SHA1
2e7123fa2960741dd0a56f357b15173df3a8f772
-
SHA256
453fce83e025cbbee8171d9dfd618118ae55973f91edf4047592cdff882e6746
-
SHA512
ec7f2441b541dd411841a4a40a68acb8a1d1be470c2c624c3b3f8ab4d5447d4a67e97ed75574feb5917219afc6c3ee0bd23f8db13c0be0d29304d48005323284
-
SSDEEP
6144:YSehiRIc+WCNmWK/fObT/bGiPsiet1yXsi+78wkZIx9rM+iOLtC1Et0P3tM2gl:luc+WCNmWK/fObT/bGiPsieAwkZIx9rF
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 01355f5fa4feef09e0cc082244e2c250_NEAS.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rvkouh.exe -
Executes dropped EXE 1 IoCs
pid Process 2052 rvkouh.exe -
Loads dropped DLL 2 IoCs
pid Process 2964 01355f5fa4feef09e0cc082244e2c250_NEAS.exe 2964 01355f5fa4feef09e0cc082244e2c250_NEAS.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /j" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /U" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /A" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /c" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /r" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /Q" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /L" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /M" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /J" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /n" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /I" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /E" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /d" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /P" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /s" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /e" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /O" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /l" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /m" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /B" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /H" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /W" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /p" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /f" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /F" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /a" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /q" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /g" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /D" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /x" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /w" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /S" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /i" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /t" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /y" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /T" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /M" 01355f5fa4feef09e0cc082244e2c250_NEAS.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /Y" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /V" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /u" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /b" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /G" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /C" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /R" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /X" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /Z" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /o" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /v" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /h" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /z" rvkouh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\rvkouh = "C:\\Users\\Admin\\rvkouh.exe /K" rvkouh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2964 01355f5fa4feef09e0cc082244e2c250_NEAS.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe 2052 rvkouh.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2964 01355f5fa4feef09e0cc082244e2c250_NEAS.exe 2052 rvkouh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2052 2964 01355f5fa4feef09e0cc082244e2c250_NEAS.exe 28 PID 2964 wrote to memory of 2052 2964 01355f5fa4feef09e0cc082244e2c250_NEAS.exe 28 PID 2964 wrote to memory of 2052 2964 01355f5fa4feef09e0cc082244e2c250_NEAS.exe 28 PID 2964 wrote to memory of 2052 2964 01355f5fa4feef09e0cc082244e2c250_NEAS.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\01355f5fa4feef09e0cc082244e2c250_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\01355f5fa4feef09e0cc082244e2c250_NEAS.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\rvkouh.exe"C:\Users\Admin\rvkouh.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD54c04a8db7485c37b374685fa90b412f5
SHA17d35dcdd2fc401410903e673afd44a6458031808
SHA256c79a3213a5764ca492ee3436345149a99b4d7a84459cabd0b18760f615f81cfb
SHA512ca923c77a8ea59e290b86381452c10eeeb46d14efcf76b6bd8d60c0ebb02cff0ff5e021afb0fd88681e58ca19ec0d8569b587dec0d6e99fbe8dc70d5b4d481d9