Analysis
-
max time kernel
97s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 20:27
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.6f097e939a486c0cc65dcd6362dddc20.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.6f097e939a486c0cc65dcd6362dddc20.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.6f097e939a486c0cc65dcd6362dddc20.exe
-
Size
123KB
-
MD5
6f097e939a486c0cc65dcd6362dddc20
-
SHA1
a96987b95882cb5045b4830c6406685443e2b51e
-
SHA256
2929709e1e45f6d8659d606a1e50474e313c87b16da9d1f12431cea87a982f65
-
SHA512
5c3613367b25e34565808ba8c364f77cd9047b765e9a91e58f736277487bb518d30358033dc3c87b3b692f1a2c2b28348b57da7e2c20840c84bd10bbf33fbb1a
-
SSDEEP
1536:6k3c2rlUV0ysgkkkkDkkkF0GNQaWXzd0Ifz60ppdQQ4oIOQw:UcgkkkkDkkkF0Geas9dmLc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation rundll32.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation NEAS.6f097e939a486c0cc65dcd6362dddc20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings NEAS.6f097e939a486c0cc65dcd6362dddc20.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1840 wrote to memory of 3960 1840 NEAS.6f097e939a486c0cc65dcd6362dddc20.exe 87 PID 1840 wrote to memory of 3960 1840 NEAS.6f097e939a486c0cc65dcd6362dddc20.exe 87 PID 1840 wrote to memory of 3960 1840 NEAS.6f097e939a486c0cc65dcd6362dddc20.exe 87 PID 3960 wrote to memory of 4244 3960 control.exe 89 PID 3960 wrote to memory of 4244 3960 control.exe 89 PID 3960 wrote to memory of 4244 3960 control.exe 89 PID 4244 wrote to memory of 4404 4244 rundll32.exe 92 PID 4244 wrote to memory of 4404 4244 rundll32.exe 92 PID 4244 wrote to memory of 4404 4244 rundll32.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6f097e939a486c0cc65dcd6362dddc20.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6f097e939a486c0cc65dcd6362dddc20.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Windows\System32\sysdm.cpl",2⤵
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Windows\System32\sysdm.cpl",3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\SystemPropertiesComputerName.exe"C:\Windows\System32\SystemPropertiesComputerName.exe"4⤵PID:4404
-
-
-