Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 20:03
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.28b60f04cf1dfeb83a971d93eaf4d220.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.28b60f04cf1dfeb83a971d93eaf4d220.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.28b60f04cf1dfeb83a971d93eaf4d220.exe
-
Size
242KB
-
MD5
28b60f04cf1dfeb83a971d93eaf4d220
-
SHA1
e040212642936269c0efa5c578ae2b20263a86e3
-
SHA256
68eca685ad422b94edd579ad4b25f1ffd8db2b032c67eff079bc7bf83ac1dcd3
-
SHA512
54f66410d62d7b236c075711364f7f5cb49711c3c541bcff586034845f5875ec20a856fd3e976067570836f50c45e730f53c25b1a8723e3712871215280c2d0f
-
SSDEEP
3072:7dk+xagnPm/P1A4xVzHon5dRZNwPjN+Y7:Dxah9RHOly
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation NEAS.28b60f04cf1dfeb83a971d93eaf4d220.exe -
Executes dropped EXE 1 IoCs
pid Process 1948 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\f92b168c\jusched.exe NEAS.28b60f04cf1dfeb83a971d93eaf4d220.exe File created C:\Program Files (x86)\f92b168c\f92b168c NEAS.28b60f04cf1dfeb83a971d93eaf4d220.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job NEAS.28b60f04cf1dfeb83a971d93eaf4d220.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4428 wrote to memory of 1948 4428 NEAS.28b60f04cf1dfeb83a971d93eaf4d220.exe 90 PID 4428 wrote to memory of 1948 4428 NEAS.28b60f04cf1dfeb83a971d93eaf4d220.exe 90 PID 4428 wrote to memory of 1948 4428 NEAS.28b60f04cf1dfeb83a971d93eaf4d220.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.28b60f04cf1dfeb83a971d93eaf4d220.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.28b60f04cf1dfeb83a971d93eaf4d220.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Program Files (x86)\f92b168c\jusched.exe"C:\Program Files (x86)\f92b168c\jusched.exe"2⤵
- Executes dropped EXE
PID:1948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
242KB
MD5432febe8cdcfbf5e0ace22037c4ea883
SHA12b93eea60686a9bf2b302c825fda6e205ccd683b
SHA25646739ee098d19006493f31664ab2398ed4c2ce1ee778b3656b5e50e1ad4937a5
SHA5120257a95ad6f0a722b11c2cb57047f28797e2e3b6b4789b31fc276efafb33c8197447d8260309b5932e9b925065e35d902a362015e161fed9c19c438ad235299e
-
Filesize
242KB
MD5432febe8cdcfbf5e0ace22037c4ea883
SHA12b93eea60686a9bf2b302c825fda6e205ccd683b
SHA25646739ee098d19006493f31664ab2398ed4c2ce1ee778b3656b5e50e1ad4937a5
SHA5120257a95ad6f0a722b11c2cb57047f28797e2e3b6b4789b31fc276efafb33c8197447d8260309b5932e9b925065e35d902a362015e161fed9c19c438ad235299e
-
Filesize
242KB
MD5432febe8cdcfbf5e0ace22037c4ea883
SHA12b93eea60686a9bf2b302c825fda6e205ccd683b
SHA25646739ee098d19006493f31664ab2398ed4c2ce1ee778b3656b5e50e1ad4937a5
SHA5120257a95ad6f0a722b11c2cb57047f28797e2e3b6b4789b31fc276efafb33c8197447d8260309b5932e9b925065e35d902a362015e161fed9c19c438ad235299e