Analysis
-
max time kernel
157s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 15:46
Behavioral task
behavioral1
Sample
NEAS.55c4e380e3ec20b6e7ef267f5c1c69f7_JC.exe
Resource
win7-20230831-en
General
-
Target
NEAS.55c4e380e3ec20b6e7ef267f5c1c69f7_JC.exe
-
Size
463KB
-
MD5
55c4e380e3ec20b6e7ef267f5c1c69f7
-
SHA1
e02c0ef2b028b70c91a391a5ca0078ba87a34bfc
-
SHA256
c557410a1bb3cc7ece7241276d06766ffa3d142e16eb00f0ceb6b55a2f6735d6
-
SHA512
01a391a4beba2406fd312628bc2741b977d8ac5bfdce27d42a44ab0a949520ed75fb7c4897955a187f6ad5307fa8fc24df51e6bc08254bd07ba162a567a8a726
-
SSDEEP
6144:P8Eoe/IebBVMweZGhHdJBV70FVKLbfW2x8VyMsmD6gzOmjpi+pMJQ8uUm9unpmK:vDdUGhHdJ370FVKmP0Ml+gzzjp+lsuX
Malware Config
Extracted
urelas
121.88.5.183
218.54.30.235
121.88.5.181
112.223.217.101
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation NEAS.55c4e380e3ec20b6e7ef267f5c1c69f7_JC.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation sander.exe -
Executes dropped EXE 2 IoCs
pid Process 400 sander.exe 1056 ctfmom.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe 1056 ctfmom.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4124 wrote to memory of 400 4124 NEAS.55c4e380e3ec20b6e7ef267f5c1c69f7_JC.exe 88 PID 4124 wrote to memory of 400 4124 NEAS.55c4e380e3ec20b6e7ef267f5c1c69f7_JC.exe 88 PID 4124 wrote to memory of 400 4124 NEAS.55c4e380e3ec20b6e7ef267f5c1c69f7_JC.exe 88 PID 4124 wrote to memory of 4688 4124 NEAS.55c4e380e3ec20b6e7ef267f5c1c69f7_JC.exe 89 PID 4124 wrote to memory of 4688 4124 NEAS.55c4e380e3ec20b6e7ef267f5c1c69f7_JC.exe 89 PID 4124 wrote to memory of 4688 4124 NEAS.55c4e380e3ec20b6e7ef267f5c1c69f7_JC.exe 89 PID 400 wrote to memory of 1056 400 sander.exe 102 PID 400 wrote to memory of 1056 400 sander.exe 102 PID 400 wrote to memory of 1056 400 sander.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.55c4e380e3ec20b6e7ef267f5c1c69f7_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.55c4e380e3ec20b6e7ef267f5c1c69f7_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\sander.exe"C:\Users\Admin\AppData\Local\Temp\sander.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\ctfmom.exe"C:\Users\Admin\AppData\Local\Temp\ctfmom.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_sannuyex.bat" "2⤵PID:4688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
293B
MD5930eff0272dda1976dfaca8fc67c55da
SHA10da14e974c95eabe94cfcef21377da13719fb276
SHA256331e71467a242fc81c18c9170ebac1e5a419445287931aece19471268a0f2856
SHA512f2e5f0c8ac1eefddf248c490942cff3e912b076bbcd8d35893889f02a70c984162a71865ad1a7158f79ec309db3bbe5960dc5ef7a1375664bb1e500564ddfe7d
-
Filesize
221KB
MD5516fe006618c1845dbabd870514f6e7f
SHA1cbabb4b95a1ed73efc5dd0a3f9aed9bf188cd622
SHA2563ffd0a7b60d9eb606017752681045440b99213f19357ce5a39d5eb75add32a4f
SHA512ee6312631ff2e044ba9cded852f6f5d419dd1e8eb9557fb1102b7b1f4d27942acd645cab2076e12022ca813cbf2ad83af90c14f3ced2d5d9cb7e56da01b58dd8
-
Filesize
221KB
MD5516fe006618c1845dbabd870514f6e7f
SHA1cbabb4b95a1ed73efc5dd0a3f9aed9bf188cd622
SHA2563ffd0a7b60d9eb606017752681045440b99213f19357ce5a39d5eb75add32a4f
SHA512ee6312631ff2e044ba9cded852f6f5d419dd1e8eb9557fb1102b7b1f4d27942acd645cab2076e12022ca813cbf2ad83af90c14f3ced2d5d9cb7e56da01b58dd8
-
Filesize
221KB
MD5516fe006618c1845dbabd870514f6e7f
SHA1cbabb4b95a1ed73efc5dd0a3f9aed9bf188cd622
SHA2563ffd0a7b60d9eb606017752681045440b99213f19357ce5a39d5eb75add32a4f
SHA512ee6312631ff2e044ba9cded852f6f5d419dd1e8eb9557fb1102b7b1f4d27942acd645cab2076e12022ca813cbf2ad83af90c14f3ced2d5d9cb7e56da01b58dd8
-
Filesize
512B
MD504113afab96ff36e7da4cabf336079cf
SHA12ab6a01f123c1ef4227cb134612749b67a237bf6
SHA2568b3cc0c31002ffa60f497966a671ff1c0a23a6efa831bd2be2cfbee7588bac16
SHA51268358e6ae577e59dd540c31d4cfcf56968d9b84416ffcd527867711165d78a9f351da0bf41afab96107b1dc736467b092f5b79be2b8f7f96f6871e4a0b5472e9
-
Filesize
463KB
MD5ccb1df3fdddb91f15963bd802bc43acd
SHA1e3ca2690ca6f9740b8089ce3cb81a1c6c3cd7aaf
SHA256a6d79463b7f42053048dfc706b1322df8741c7ad237db68a37065e6d3b7f1a8f
SHA512bf9ee724f8431f300add08fb1eb9e4e974d81b62ce4ad2c784f7e3417d05a08b051c2b7f00fa915bc8d1bd6fea6c2b0d8c42bcef8450d933583b114e74edf82b
-
Filesize
463KB
MD5ccb1df3fdddb91f15963bd802bc43acd
SHA1e3ca2690ca6f9740b8089ce3cb81a1c6c3cd7aaf
SHA256a6d79463b7f42053048dfc706b1322df8741c7ad237db68a37065e6d3b7f1a8f
SHA512bf9ee724f8431f300add08fb1eb9e4e974d81b62ce4ad2c784f7e3417d05a08b051c2b7f00fa915bc8d1bd6fea6c2b0d8c42bcef8450d933583b114e74edf82b
-
Filesize
463KB
MD5ccb1df3fdddb91f15963bd802bc43acd
SHA1e3ca2690ca6f9740b8089ce3cb81a1c6c3cd7aaf
SHA256a6d79463b7f42053048dfc706b1322df8741c7ad237db68a37065e6d3b7f1a8f
SHA512bf9ee724f8431f300add08fb1eb9e4e974d81b62ce4ad2c784f7e3417d05a08b051c2b7f00fa915bc8d1bd6fea6c2b0d8c42bcef8450d933583b114e74edf82b