Analysis

  • max time kernel
    144s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-10-2023 15:52

General

  • Target

    NEAS.65ca061c3cb6a7aabf0c09b289ace010_JC.exe

  • Size

    42KB

  • MD5

    65ca061c3cb6a7aabf0c09b289ace010

  • SHA1

    f3608940b2ce3b34eef1b85e9f6c7e7fd0f57556

  • SHA256

    dbe3570162d029a48024d276e0169c995868e6f3cf710cc8f063146008da46b3

  • SHA512

    3e7c8985493ec50a66c18bb6e18d9182df0a13682a30deed5898eaa76ca24b8daf1250a658d0bf6f75e91bebcc4859cbcbc82b9fc74acfc68a6d6a8d113bb13b

  • SSDEEP

    768:0ex2ZFuS3P4OjHXRrs9sINeZEtejlIkoLN127BFVn2p4lAnZ8Oog+favSxf7x8qQ:0eqPjXRrs9sINeZEtejlIkoLN127BFVE

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.65ca061c3cb6a7aabf0c09b289ace010_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.65ca061c3cb6a7aabf0c09b289ace010_JC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4604
    • C:\Users\Admin\AppData\Local\Temp\google_updater.exe
      "C:\Users\Admin\AppData\Local\Temp\google_updater.exe"
      2⤵
      • Executes dropped EXE
      PID:3688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\google_updater.exe

    Filesize

    42KB

    MD5

    e866dfc827f9abbf37cd48fa84a1012f

    SHA1

    985e0ad7271b504af669a8e255b8a36e6a6aeea2

    SHA256

    c46aa925b8cbae80d3ac6f13d7bf7ceaae52971d74c22ce9c1a86bd7cf86dd21

    SHA512

    2291b7e439c15fda302742e486f843ead4ecd363273d059f3c672748c6ea7935a011540a44ee1c4470f043b5576ce2a8f09d95e19d42799afd48e6da0a08fe05

  • C:\Users\Admin\AppData\Local\Temp\google_updater.exe

    Filesize

    42KB

    MD5

    e866dfc827f9abbf37cd48fa84a1012f

    SHA1

    985e0ad7271b504af669a8e255b8a36e6a6aeea2

    SHA256

    c46aa925b8cbae80d3ac6f13d7bf7ceaae52971d74c22ce9c1a86bd7cf86dd21

    SHA512

    2291b7e439c15fda302742e486f843ead4ecd363273d059f3c672748c6ea7935a011540a44ee1c4470f043b5576ce2a8f09d95e19d42799afd48e6da0a08fe05

  • C:\Users\Admin\AppData\Local\Temp\google_updater.exe

    Filesize

    42KB

    MD5

    e866dfc827f9abbf37cd48fa84a1012f

    SHA1

    985e0ad7271b504af669a8e255b8a36e6a6aeea2

    SHA256

    c46aa925b8cbae80d3ac6f13d7bf7ceaae52971d74c22ce9c1a86bd7cf86dd21

    SHA512

    2291b7e439c15fda302742e486f843ead4ecd363273d059f3c672748c6ea7935a011540a44ee1c4470f043b5576ce2a8f09d95e19d42799afd48e6da0a08fe05

  • memory/3688-12-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4604-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB