Analysis
-
max time kernel
160s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 17:56
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.1e4cc5fefacb6ae7d640fbbe43669f00_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.1e4cc5fefacb6ae7d640fbbe43669f00_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.1e4cc5fefacb6ae7d640fbbe43669f00_JC.exe
-
Size
29KB
-
MD5
1e4cc5fefacb6ae7d640fbbe43669f00
-
SHA1
ba364afbab548f0057549e32cb45a10fec7d4131
-
SHA256
653c35ccd41efee6169c635289dbc2bc2285242ec13cf8908e71d187f328875d
-
SHA512
e5c02a1a0df0a49187f910efb905e5814ca6de56409c7455e3c44274586e5264ff345a60cc87fe0a04ed06c83d8a43fb647fb01d1b10337cfcf282952ff1cf29
-
SSDEEP
384:xiUGhG7/mdI2is9kNWKpm5YG/TsIOtLNLCBsC/XzRR:cUQqQp8y5jwI0LNMsuX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation NEAS.1e4cc5fefacb6ae7d640fbbe43669f00_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 2092 camis.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 928 wrote to memory of 2092 928 NEAS.1e4cc5fefacb6ae7d640fbbe43669f00_JC.exe 90 PID 928 wrote to memory of 2092 928 NEAS.1e4cc5fefacb6ae7d640fbbe43669f00_JC.exe 90 PID 928 wrote to memory of 2092 928 NEAS.1e4cc5fefacb6ae7d640fbbe43669f00_JC.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.1e4cc5fefacb6ae7d640fbbe43669f00_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.1e4cc5fefacb6ae7d640fbbe43669f00_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Local\Temp\camis.exe"C:\Users\Admin\AppData\Local\Temp\camis.exe"2⤵
- Executes dropped EXE
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5579754b62000eeef34a1da9c50fbf86a
SHA1b067de512d33869e95d7f9a0c635f2974f2b05d7
SHA256c8e8b93e43d6c3790db087653bcd121ec984f6d2b923ab62911d507649af73e2
SHA512e9ad56f5c3e8ffcd4806529da2bb62ae04888d69003ca6fc09e015260a2b934524001a35a4daf7417a3da0a1768ac7843317a792f6d443f355a5f4266adb7e13
-
Filesize
29KB
MD5579754b62000eeef34a1da9c50fbf86a
SHA1b067de512d33869e95d7f9a0c635f2974f2b05d7
SHA256c8e8b93e43d6c3790db087653bcd121ec984f6d2b923ab62911d507649af73e2
SHA512e9ad56f5c3e8ffcd4806529da2bb62ae04888d69003ca6fc09e015260a2b934524001a35a4daf7417a3da0a1768ac7843317a792f6d443f355a5f4266adb7e13
-
Filesize
29KB
MD5579754b62000eeef34a1da9c50fbf86a
SHA1b067de512d33869e95d7f9a0c635f2974f2b05d7
SHA256c8e8b93e43d6c3790db087653bcd121ec984f6d2b923ab62911d507649af73e2
SHA512e9ad56f5c3e8ffcd4806529da2bb62ae04888d69003ca6fc09e015260a2b934524001a35a4daf7417a3da0a1768ac7843317a792f6d443f355a5f4266adb7e13