Analysis
-
max time kernel
152s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2023, 16:41
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d046b82d135e4cbb494d03252191cab0_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.d046b82d135e4cbb494d03252191cab0_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.d046b82d135e4cbb494d03252191cab0_JC.exe
-
Size
137KB
-
MD5
d046b82d135e4cbb494d03252191cab0
-
SHA1
16cfec23520120181f703d5f4a72c089402edc7f
-
SHA256
b488d308d4bd37902a06e5fd5649402992de32295214516e28214fc75e42709a
-
SHA512
0c8b2e64418e3bfd3f0616e34f766c6a98448456276875f379f5d162df31df3b06ce0d7afee425eccc7511fb3b98a7ac0f10c34617c7458e2ff4b4dd4392eeec
-
SSDEEP
3072:Z6pQc+sSxnTrGadgsFqZeo4pwkhUmZr3hPsOraST:Z6p2sSxTrGvsFUejWyZr3hPswa4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation NEAS.d046b82d135e4cbb494d03252191cab0_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1144 NEAS.d046b82d135e4cbb494d03252191cab0_JC.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1144 wrote to memory of 4780 1144 NEAS.d046b82d135e4cbb494d03252191cab0_JC.exe 86 PID 1144 wrote to memory of 4780 1144 NEAS.d046b82d135e4cbb494d03252191cab0_JC.exe 86 PID 1144 wrote to memory of 4780 1144 NEAS.d046b82d135e4cbb494d03252191cab0_JC.exe 86 PID 4780 wrote to memory of 1944 4780 cmd.exe 89 PID 4780 wrote to memory of 1944 4780 cmd.exe 89 PID 4780 wrote to memory of 1944 4780 cmd.exe 89 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1944 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d046b82d135e4cbb494d03252191cab0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d046b82d135e4cbb494d03252191cab0_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\rmtCCC2.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\NEAS.d046b82d135e4cbb494d03252191cab0_JC.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\NEAS.d046b82d135e4cbb494d03252191cab0_JC.exe"3⤵
- Views/modifies file attributes
PID:1944
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50B
MD5d08ee7554c6734fed8c28f62af83f08c
SHA13cf5a3a887c490f5c6135ac676cc9704f3101da1
SHA2560f2c83ce84482972c4574cd0ae9ee0e647f1445dcc929f7bd6d79d512fc22485
SHA512972ed0e05a27d5cef61f1dd3fd0ee92463232f34167ce136ecfbc7955bda5af11a8466effc4f0931ca38b4a5b48e1351186e0dfb671099c33b6cb10c03dba828