Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2023 14:53
Behavioral task
behavioral1
Sample
NEAS.a9f576a29aa60e35acfc621638239434_JC.exe
Resource
win7-20230831-en
General
-
Target
NEAS.a9f576a29aa60e35acfc621638239434_JC.exe
-
Size
418KB
-
MD5
a9f576a29aa60e35acfc621638239434
-
SHA1
3cf23e9c7446c0203c83be7770d42605d6816764
-
SHA256
019d71fb4d55abe035b657292e0ddd89e3c827b9654337cab1dbd30583320a44
-
SHA512
82c8269344cc12932afa11d8a2e3cfac3eaf0e854bf9e910d7359d3a052ba7e53b1d8f693413b26cf5fbcc4697854bfda9dc7230ddb649c6e23e77a118979630
-
SSDEEP
6144:XxiqjFBwbGbGQfkOuuGDblGE2OeMfqP3mOa2cBlBPAsEh:XhjQK3f/utLeMfBnBch
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation fuete.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation jopuac.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation NEAS.a9f576a29aa60e35acfc621638239434_JC.exe -
Executes dropped EXE 3 IoCs
pid Process 1984 fuete.exe 4708 jopuac.exe 1088 viboe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe 1088 viboe.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4400 wrote to memory of 1984 4400 NEAS.a9f576a29aa60e35acfc621638239434_JC.exe 88 PID 4400 wrote to memory of 1984 4400 NEAS.a9f576a29aa60e35acfc621638239434_JC.exe 88 PID 4400 wrote to memory of 1984 4400 NEAS.a9f576a29aa60e35acfc621638239434_JC.exe 88 PID 4400 wrote to memory of 5036 4400 NEAS.a9f576a29aa60e35acfc621638239434_JC.exe 89 PID 4400 wrote to memory of 5036 4400 NEAS.a9f576a29aa60e35acfc621638239434_JC.exe 89 PID 4400 wrote to memory of 5036 4400 NEAS.a9f576a29aa60e35acfc621638239434_JC.exe 89 PID 1984 wrote to memory of 4708 1984 fuete.exe 91 PID 1984 wrote to memory of 4708 1984 fuete.exe 91 PID 1984 wrote to memory of 4708 1984 fuete.exe 91 PID 4708 wrote to memory of 1088 4708 jopuac.exe 103 PID 4708 wrote to memory of 1088 4708 jopuac.exe 103 PID 4708 wrote to memory of 1088 4708 jopuac.exe 103 PID 4708 wrote to memory of 2200 4708 jopuac.exe 104 PID 4708 wrote to memory of 2200 4708 jopuac.exe 104 PID 4708 wrote to memory of 2200 4708 jopuac.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.a9f576a29aa60e35acfc621638239434_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.a9f576a29aa60e35acfc621638239434_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\fuete.exe"C:\Users\Admin\AppData\Local\Temp\fuete.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\jopuac.exe"C:\Users\Admin\AppData\Local\Temp\jopuac.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\viboe.exe"C:\Users\Admin\AppData\Local\Temp\viboe.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:2200
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵PID:5036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
292B
MD5e0a7469a29220a6f7a8d0252aec5bd31
SHA1b61e94e550409fafff7710795965267c79f320f6
SHA256e5a70a45e004fe2266dcf669f3895181284cedda5af971c66c5eb20bf5c7e82f
SHA5120c8be620ebb11f71fd85d53338bcecb93ee31444704b317f69472827029398d16004f82a0c02167a14d7bcddd47d461317934b93d7125ddae852c74a8995974a
-
Filesize
224B
MD5e53a0894c2bf432cd054ccaa833443c2
SHA178cb224c42b593438676d45a51f70be8e825cf93
SHA2562623c63a1b021e44d90cdd83be9f97ec6a24cc8f7c7dcf9253a01b8cd2dbd6c8
SHA512ac2dd46641eaf19f721d3fef92376883a1a00b8eb29838e8b8bcb6e356edac988ec8ea0a7bc3bde96a04b47dc340a1893b009d8dc4e6f0fef163f452db4df9a1
-
Filesize
418KB
MD5f4b69b7f41b2e54ecec698b1c28ec87e
SHA17436c5f9d6c673825d17323a2a38075f07c81eec
SHA2568525aaee3a2f1dc913d2ca4d319e9495faf2c2332d71ba472e09bda50574e642
SHA51217d54658c42a5c26282388b10f53f8b3a4c5cd53d58d81fc460c07e3f4b09e47742da3350620b2c1e867f882854e9bb4cf093b3ab7e2ef76b9a613d268fa6a9c
-
Filesize
418KB
MD5f4b69b7f41b2e54ecec698b1c28ec87e
SHA17436c5f9d6c673825d17323a2a38075f07c81eec
SHA2568525aaee3a2f1dc913d2ca4d319e9495faf2c2332d71ba472e09bda50574e642
SHA51217d54658c42a5c26282388b10f53f8b3a4c5cd53d58d81fc460c07e3f4b09e47742da3350620b2c1e867f882854e9bb4cf093b3ab7e2ef76b9a613d268fa6a9c
-
Filesize
418KB
MD5f4b69b7f41b2e54ecec698b1c28ec87e
SHA17436c5f9d6c673825d17323a2a38075f07c81eec
SHA2568525aaee3a2f1dc913d2ca4d319e9495faf2c2332d71ba472e09bda50574e642
SHA51217d54658c42a5c26282388b10f53f8b3a4c5cd53d58d81fc460c07e3f4b09e47742da3350620b2c1e867f882854e9bb4cf093b3ab7e2ef76b9a613d268fa6a9c
-
Filesize
512B
MD5c4aa85005a1862a3fcc87aaf639e5715
SHA1d61a4ad218d0a0160d4dbaa904133beca5ddfb7c
SHA2569a87485e5511ae8aca689621d322a035a88932ad39d6d6cac7ed1ad0e2ee93f4
SHA51291c2fd401833b34ca2ce94a4724d3fd81956397d4b5a12e8c22c1ead0e9edea512fdc38441465f663223dd49cff8f40d733233210d3589b7d8704a92b7b3c45f
-
Filesize
418KB
MD5f4b69b7f41b2e54ecec698b1c28ec87e
SHA17436c5f9d6c673825d17323a2a38075f07c81eec
SHA2568525aaee3a2f1dc913d2ca4d319e9495faf2c2332d71ba472e09bda50574e642
SHA51217d54658c42a5c26282388b10f53f8b3a4c5cd53d58d81fc460c07e3f4b09e47742da3350620b2c1e867f882854e9bb4cf093b3ab7e2ef76b9a613d268fa6a9c
-
Filesize
418KB
MD5f4b69b7f41b2e54ecec698b1c28ec87e
SHA17436c5f9d6c673825d17323a2a38075f07c81eec
SHA2568525aaee3a2f1dc913d2ca4d319e9495faf2c2332d71ba472e09bda50574e642
SHA51217d54658c42a5c26282388b10f53f8b3a4c5cd53d58d81fc460c07e3f4b09e47742da3350620b2c1e867f882854e9bb4cf093b3ab7e2ef76b9a613d268fa6a9c
-
Filesize
189KB
MD5be5b8932992ad57e02be177d2692c617
SHA1d503cbf1008816ce9066a9962c657fa6f0c46922
SHA2564755c7b25d75d9c0201983264c9f7c421d2eb351415835e55b69850456c40c9c
SHA5122d10ef1d14cee5eb134dde082a7d050cb4179a3dec4fa919b14ab743f553cc3347765a36443539aae11edee6c26a977d55c8aa20fc699101b91b20e78029b9fc
-
Filesize
189KB
MD5be5b8932992ad57e02be177d2692c617
SHA1d503cbf1008816ce9066a9962c657fa6f0c46922
SHA2564755c7b25d75d9c0201983264c9f7c421d2eb351415835e55b69850456c40c9c
SHA5122d10ef1d14cee5eb134dde082a7d050cb4179a3dec4fa919b14ab743f553cc3347765a36443539aae11edee6c26a977d55c8aa20fc699101b91b20e78029b9fc
-
Filesize
189KB
MD5be5b8932992ad57e02be177d2692c617
SHA1d503cbf1008816ce9066a9962c657fa6f0c46922
SHA2564755c7b25d75d9c0201983264c9f7c421d2eb351415835e55b69850456c40c9c
SHA5122d10ef1d14cee5eb134dde082a7d050cb4179a3dec4fa919b14ab743f553cc3347765a36443539aae11edee6c26a977d55c8aa20fc699101b91b20e78029b9fc