Analysis

  • max time kernel
    169s
  • max time network
    200s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2023, 20:24

General

  • Target

    NEAS.5d1032af44bb9577d5fa9b9aa6ebe310.exe

  • Size

    12KB

  • MD5

    5d1032af44bb9577d5fa9b9aa6ebe310

  • SHA1

    da14d69875cd52a09cc2b15e78c8573b7523d2d2

  • SHA256

    029ddcded7006f27c62a28a3c6c534deae30c57702aadbe021d5c21a4435a259

  • SHA512

    c7d0bed666a5609991b3926aa537180982db9f211f4e9bb1f1c1d96c127fb3271def99321621660b2fe621634c93e8fcf3993601bda9ab6847fde8f9d20eaf00

  • SSDEEP

    384:TL7li/2zuq2DcEQvdhcJKLTp/NK9xaEg:3mM/Q9cEg

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.5d1032af44bb9577d5fa9b9aa6ebe310.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.5d1032af44bb9577d5fa9b9aa6ebe310.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4536
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\qujkqmpz\qujkqmpz.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3316
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES85D5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3531E2FE1D4B4B8683A75EC9E2DBE6F.TMP"
        3⤵
          PID:3528
      • C:\Users\Admin\AppData\Local\Temp\tmp845F.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp845F.tmp.exe" C:\Users\Admin\AppData\Local\Temp\NEAS.5d1032af44bb9577d5fa9b9aa6ebe310.exe
        2⤵
        • Executes dropped EXE
        PID:5112

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RE.resources

      Filesize

      2KB

      MD5

      d7d0a1944123b9db12378a224f0f971d

      SHA1

      718d5e016fba744511d612f7b9a71f424c124cac

      SHA256

      7f29161502b371ef8508d6c0caed8900bcd932b4fec999bfcc900b17023b2eef

      SHA512

      cc8c64352ae68c0d89d96528c674750ad0f8394b38dbd9e48ff96899b5e8c9f81528c1a7c7e6b39c36584ab4d4245aad6d9fe4b83706e2cc8e733cbd39ad66da

    • C:\Users\Admin\AppData\Local\Temp\RES85D5.tmp

      Filesize

      1KB

      MD5

      e3b2ac8b686cdacc6e7192040c0976db

      SHA1

      23d5f2617f5c5e189d9a3f5f5951097469315892

      SHA256

      1478d3c44bbe6f4577b59c71f431ad09ca5b5d786de3c265a97632dfa4f3ced0

      SHA512

      85e12e4c97514f990cc4aa2bf6ed207a80e685ac777e9b3298c030646998f702e9b30a1e84ef7008bc525677fada14c4131b0b24175e080cf4065ee25b5ed4ae

    • C:\Users\Admin\AppData\Local\Temp\qujkqmpz\qujkqmpz.0.vb

      Filesize

      2KB

      MD5

      1ac4123cfbb1238c351a19e08a1813cc

      SHA1

      e2a7fbe19b49ced8c450ca74a7fb38004d978b6e

      SHA256

      57442dffc9f154bf53d21dbda21a9228e547dbf7925b34da7525c4ffee7d922e

      SHA512

      98e8bac4071067f7e6c4dc24c58bf1604443a0a0294a0f976a9084c2e5aae5dc9ef8a28dddb16055322dd2b51e3bfcb1fa25e73422b80ed229efc6c1f29b46b7

    • C:\Users\Admin\AppData\Local\Temp\qujkqmpz\qujkqmpz.cmdline

      Filesize

      273B

      MD5

      c151c21683992e924c720c6a7ae42f05

      SHA1

      7285cb22643530a43c9498b51e690f2bc7d25552

      SHA256

      c8536d5a56e41e6f74f655a95bce8723c14d1342e1b81d30915d2a355f659c53

      SHA512

      d55e2b7084dd7be07e81aab19d8730fa664646d56192ac18767314c875fdd4e9bb0493468ae92fb70f88c677211a816e74965d8797730c0ae5ad307c5d59c42c

    • C:\Users\Admin\AppData\Local\Temp\tmp845F.tmp.exe

      Filesize

      12KB

      MD5

      e94b02c2f13d971986dbea73e8299a7d

      SHA1

      db0208e791cb09961851c89d81cc410f6b19a794

      SHA256

      0c251eb6b5f97f9963e5106666793e498b2c499382869c26f894887a4b78a339

      SHA512

      117f157a165da44ebe51524d60ce5f0d4ceaccb641ad0b60fcdee22c58a9b2bc4d86ed13794ca09b01c4bfc572fb2b8d5f7fd4118b42720d641b39de2116de6b

    • C:\Users\Admin\AppData\Local\Temp\tmp845F.tmp.exe

      Filesize

      12KB

      MD5

      e94b02c2f13d971986dbea73e8299a7d

      SHA1

      db0208e791cb09961851c89d81cc410f6b19a794

      SHA256

      0c251eb6b5f97f9963e5106666793e498b2c499382869c26f894887a4b78a339

      SHA512

      117f157a165da44ebe51524d60ce5f0d4ceaccb641ad0b60fcdee22c58a9b2bc4d86ed13794ca09b01c4bfc572fb2b8d5f7fd4118b42720d641b39de2116de6b

    • C:\Users\Admin\AppData\Local\Temp\vbc3531E2FE1D4B4B8683A75EC9E2DBE6F.TMP

      Filesize

      1KB

      MD5

      86bd09679b6ff9eb601338a8b708b27f

      SHA1

      f5cd1ef0e1039871c8a80f14c9eeda6b87700bcd

      SHA256

      991f288c91229c79fceb8ffaaabcca3bae300c4e8c50682acd7e590bef48dc70

      SHA512

      a2f255cfa5e882aab48f6d99c765b39857c0cc4e81cbec86a7e104ef59a0f4a3e19c28dee0e3521ce123f797803b1c534103d0a5808f38cecd336e24860ab5e2

    • memory/4536-0-0x0000000074840000-0x0000000074FF0000-memory.dmp

      Filesize

      7.7MB

    • memory/4536-1-0x00000000002A0000-0x00000000002AA000-memory.dmp

      Filesize

      40KB

    • memory/4536-21-0x0000000074840000-0x0000000074FF0000-memory.dmp

      Filesize

      7.7MB

    • memory/4536-2-0x0000000004C70000-0x0000000004D0C000-memory.dmp

      Filesize

      624KB

    • memory/4536-23-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

      Filesize

      64KB

    • memory/4536-7-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

      Filesize

      64KB

    • memory/4536-27-0x0000000074840000-0x0000000074FF0000-memory.dmp

      Filesize

      7.7MB

    • memory/5112-26-0x0000000074840000-0x0000000074FF0000-memory.dmp

      Filesize

      7.7MB

    • memory/5112-28-0x00000000000E0000-0x00000000000EA000-memory.dmp

      Filesize

      40KB

    • memory/5112-29-0x0000000005050000-0x00000000055F4000-memory.dmp

      Filesize

      5.6MB

    • memory/5112-30-0x0000000004AA0000-0x0000000004B32000-memory.dmp

      Filesize

      584KB

    • memory/5112-32-0x0000000074840000-0x0000000074FF0000-memory.dmp

      Filesize

      7.7MB