Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 17:12
Behavioral task
behavioral1
Sample
NEAS.09bd6d09eff43415ca44a1c1e6b09f70_JC.exe
Resource
win7-20230831-en
General
-
Target
NEAS.09bd6d09eff43415ca44a1c1e6b09f70_JC.exe
-
Size
235KB
-
MD5
09bd6d09eff43415ca44a1c1e6b09f70
-
SHA1
ae29c63e39d65c7293207e89cd748e3763e18186
-
SHA256
995fe06ab9417f50c623fd3bebf9cf04e54d35b1c05d19ad631d4381cc2d2636
-
SHA512
df9658fbdb95bf2e0977c52f5fbf3aa6b85691f4827f909004f5bbb7bc9f7d136a89b88f8df37aa98d14e35705073cb2592efe320178ec38a0b0629f6af56baa
-
SSDEEP
6144:LEPAc72ss5pKL93yMax7pH3F2d1ugMeSWp:LE32xpoaxBFg1ugMeS
Malware Config
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation NEAS.09bd6d09eff43415ca44a1c1e6b09f70_JC.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation explothe.exe -
Executes dropped EXE 3 IoCs
pid Process 3824 explothe.exe 1728 explothe.exe 1304 explothe.exe -
Loads dropped DLL 1 IoCs
pid Process 2020 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3776 schtasks.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1564 wrote to memory of 3824 1564 NEAS.09bd6d09eff43415ca44a1c1e6b09f70_JC.exe 83 PID 1564 wrote to memory of 3824 1564 NEAS.09bd6d09eff43415ca44a1c1e6b09f70_JC.exe 83 PID 1564 wrote to memory of 3824 1564 NEAS.09bd6d09eff43415ca44a1c1e6b09f70_JC.exe 83 PID 3824 wrote to memory of 3776 3824 explothe.exe 84 PID 3824 wrote to memory of 3776 3824 explothe.exe 84 PID 3824 wrote to memory of 3776 3824 explothe.exe 84 PID 3824 wrote to memory of 2992 3824 explothe.exe 85 PID 3824 wrote to memory of 2992 3824 explothe.exe 85 PID 3824 wrote to memory of 2992 3824 explothe.exe 85 PID 2992 wrote to memory of 3792 2992 cmd.exe 88 PID 2992 wrote to memory of 3792 2992 cmd.exe 88 PID 2992 wrote to memory of 3792 2992 cmd.exe 88 PID 2992 wrote to memory of 1552 2992 cmd.exe 89 PID 2992 wrote to memory of 1552 2992 cmd.exe 89 PID 2992 wrote to memory of 1552 2992 cmd.exe 89 PID 2992 wrote to memory of 4152 2992 cmd.exe 90 PID 2992 wrote to memory of 4152 2992 cmd.exe 90 PID 2992 wrote to memory of 4152 2992 cmd.exe 90 PID 2992 wrote to memory of 3932 2992 cmd.exe 91 PID 2992 wrote to memory of 3932 2992 cmd.exe 91 PID 2992 wrote to memory of 3932 2992 cmd.exe 91 PID 2992 wrote to memory of 5040 2992 cmd.exe 92 PID 2992 wrote to memory of 5040 2992 cmd.exe 92 PID 2992 wrote to memory of 5040 2992 cmd.exe 92 PID 2992 wrote to memory of 3784 2992 cmd.exe 93 PID 2992 wrote to memory of 3784 2992 cmd.exe 93 PID 2992 wrote to memory of 3784 2992 cmd.exe 93 PID 3824 wrote to memory of 2020 3824 explothe.exe 102 PID 3824 wrote to memory of 2020 3824 explothe.exe 102 PID 3824 wrote to memory of 2020 3824 explothe.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.09bd6d09eff43415ca44a1c1e6b09f70_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.09bd6d09eff43415ca44a1c1e6b09f70_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F3⤵
- Creates scheduled task(s)
PID:3776
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:3792
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"4⤵PID:1552
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E4⤵PID:4152
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:3932
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"4⤵PID:5040
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E4⤵PID:3784
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:2020
-
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:1728
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:1304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235KB
MD509bd6d09eff43415ca44a1c1e6b09f70
SHA1ae29c63e39d65c7293207e89cd748e3763e18186
SHA256995fe06ab9417f50c623fd3bebf9cf04e54d35b1c05d19ad631d4381cc2d2636
SHA512df9658fbdb95bf2e0977c52f5fbf3aa6b85691f4827f909004f5bbb7bc9f7d136a89b88f8df37aa98d14e35705073cb2592efe320178ec38a0b0629f6af56baa
-
Filesize
235KB
MD509bd6d09eff43415ca44a1c1e6b09f70
SHA1ae29c63e39d65c7293207e89cd748e3763e18186
SHA256995fe06ab9417f50c623fd3bebf9cf04e54d35b1c05d19ad631d4381cc2d2636
SHA512df9658fbdb95bf2e0977c52f5fbf3aa6b85691f4827f909004f5bbb7bc9f7d136a89b88f8df37aa98d14e35705073cb2592efe320178ec38a0b0629f6af56baa
-
Filesize
235KB
MD509bd6d09eff43415ca44a1c1e6b09f70
SHA1ae29c63e39d65c7293207e89cd748e3763e18186
SHA256995fe06ab9417f50c623fd3bebf9cf04e54d35b1c05d19ad631d4381cc2d2636
SHA512df9658fbdb95bf2e0977c52f5fbf3aa6b85691f4827f909004f5bbb7bc9f7d136a89b88f8df37aa98d14e35705073cb2592efe320178ec38a0b0629f6af56baa
-
Filesize
235KB
MD509bd6d09eff43415ca44a1c1e6b09f70
SHA1ae29c63e39d65c7293207e89cd748e3763e18186
SHA256995fe06ab9417f50c623fd3bebf9cf04e54d35b1c05d19ad631d4381cc2d2636
SHA512df9658fbdb95bf2e0977c52f5fbf3aa6b85691f4827f909004f5bbb7bc9f7d136a89b88f8df37aa98d14e35705073cb2592efe320178ec38a0b0629f6af56baa
-
Filesize
235KB
MD509bd6d09eff43415ca44a1c1e6b09f70
SHA1ae29c63e39d65c7293207e89cd748e3763e18186
SHA256995fe06ab9417f50c623fd3bebf9cf04e54d35b1c05d19ad631d4381cc2d2636
SHA512df9658fbdb95bf2e0977c52f5fbf3aa6b85691f4827f909004f5bbb7bc9f7d136a89b88f8df37aa98d14e35705073cb2592efe320178ec38a0b0629f6af56baa
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9