Analysis

  • max time kernel
    142s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-10-2023 13:31

General

  • Target

    NEAS.3c384c9d8c7d64f86d8506f713191cd90b83ec734a19137ce86f13067bbc426cexe_JC.exe

  • Size

    252KB

  • MD5

    9452dff09397314ab6dc4c685e6c8f02

  • SHA1

    3374e1886a0992cc147ae1d0005ee387b3840354

  • SHA256

    3c384c9d8c7d64f86d8506f713191cd90b83ec734a19137ce86f13067bbc426c

  • SHA512

    f9cde18bba746fa189ba9a4f995707f802d934550606905dc54420cbaff66268db61b63c57a0891d63040d95eee663b424ae472721474ec15e541b66c7f97c19

  • SSDEEP

    3072:bwd998ZfNKx2bdV4VUVAMmoymL0qMA6wcyN7cQZzi0oeH5NrM0:C98KwbXV3moymJMGNtcQZz5vr

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.3c384c9d8c7d64f86d8506f713191cd90b83ec734a19137ce86f13067bbc426cexe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.3c384c9d8c7d64f86d8506f713191cd90b83ec734a19137ce86f13067bbc426cexe_JC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\3805931288.exe"
      2⤵
        PID:644
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c taskkill /im "NEAS.3c384c9d8c7d64f86d8506f713191cd90b83ec734a19137ce86f13067bbc426cexe_JC.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\NEAS.3c384c9d8c7d64f86d8506f713191cd90b83ec734a19137ce86f13067bbc426cexe_JC.exe" & exit
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2208
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /im "NEAS.3c384c9d8c7d64f86d8506f713191cd90b83ec734a19137ce86f13067bbc426cexe_JC.exe" /f
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4424
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 1564
        2⤵
        • Program crash
        PID:1796
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2288 -ip 2288
      1⤵
        PID:2800

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\3805931288.exe

        Filesize

        107B

        MD5

        ff4ed829ffd04e9c6095842b07d11f09

        SHA1

        6fbe9df856956467c1691558796c86fc392ed5b6

        SHA256

        839488ebc08446a096a893996ed23eac321ac166724cd8c5d9092057834d2d79

        SHA512

        8be2c3f8f59f393d5ef7c4998e33daeb8382f262e4741b4885e11898a6e4ff4c405a2fcf7b15a2edf6dfc7d93196482f2242e53ffd4ec91f8d28180b36d0e658

      • memory/2288-1-0x0000000000880000-0x0000000000980000-memory.dmp

        Filesize

        1024KB

      • memory/2288-2-0x0000000002320000-0x000000000235E000-memory.dmp

        Filesize

        248KB

      • memory/2288-3-0x0000000000400000-0x00000000005B6000-memory.dmp

        Filesize

        1.7MB

      • memory/2288-10-0x0000000000400000-0x00000000005B6000-memory.dmp

        Filesize

        1.7MB

      • memory/2288-11-0x0000000000400000-0x00000000005B6000-memory.dmp

        Filesize

        1.7MB

      • memory/2288-12-0x0000000002320000-0x000000000235E000-memory.dmp

        Filesize

        248KB