Analysis
-
max time kernel
149s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 19:14
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.5259e4ce178d4978b0172bd3b4b19060_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.5259e4ce178d4978b0172bd3b4b19060_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.5259e4ce178d4978b0172bd3b4b19060_JC.exe
-
Size
37KB
-
MD5
5259e4ce178d4978b0172bd3b4b19060
-
SHA1
439a5d4ad00024399f76b3fe0859b19ba8ea4637
-
SHA256
3b9c86a6c73211be113ebc3b0f161284343487b07f7640c74b8700027ad092a7
-
SHA512
aba9fddbe033215d16de9588ea35753d8c2d17ae38e3206e56805c756bb65630096bef0a8a1a9bd533aa1d401573fea3ae37791b122f15072971b36b0d7465ca
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7DFHQ:X6QFElP6n+gJQMOtEvwDpjBmzDu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation NEAS.5259e4ce178d4978b0172bd3b4b19060_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 2340 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4444 wrote to memory of 2340 4444 NEAS.5259e4ce178d4978b0172bd3b4b19060_JC.exe 85 PID 4444 wrote to memory of 2340 4444 NEAS.5259e4ce178d4978b0172bd3b4b19060_JC.exe 85 PID 4444 wrote to memory of 2340 4444 NEAS.5259e4ce178d4978b0172bd3b4b19060_JC.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5259e4ce178d4978b0172bd3b4b19060_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5259e4ce178d4978b0172bd3b4b19060_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD50f49403734563fcc199dad276cf48971
SHA16e3ee907c614546c16b9cf30d3740b980adabe71
SHA256dde05481247ef24030a5778ced3c7cd308022f5dd212e230578217d6b2634ab1
SHA51291510e0754c5ad47da63339eac610c8f0ae46e8b7e75d636d2477db5b7ea7e54d2aa049a097de12b58a22178c5280d97aacd046f1fe3fb6c049b7389893a7224
-
Filesize
37KB
MD50f49403734563fcc199dad276cf48971
SHA16e3ee907c614546c16b9cf30d3740b980adabe71
SHA256dde05481247ef24030a5778ced3c7cd308022f5dd212e230578217d6b2634ab1
SHA51291510e0754c5ad47da63339eac610c8f0ae46e8b7e75d636d2477db5b7ea7e54d2aa049a097de12b58a22178c5280d97aacd046f1fe3fb6c049b7389893a7224
-
Filesize
37KB
MD50f49403734563fcc199dad276cf48971
SHA16e3ee907c614546c16b9cf30d3740b980adabe71
SHA256dde05481247ef24030a5778ced3c7cd308022f5dd212e230578217d6b2634ab1
SHA51291510e0754c5ad47da63339eac610c8f0ae46e8b7e75d636d2477db5b7ea7e54d2aa049a097de12b58a22178c5280d97aacd046f1fe3fb6c049b7389893a7224