Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2023 20:14

General

  • Target

    NEAS.4430be82a353203babc9a38ea933ec20.exe

  • Size

    45KB

  • MD5

    4430be82a353203babc9a38ea933ec20

  • SHA1

    c508fc1b948bc1076bcbaf0da69fb5925a009f0a

  • SHA256

    e42160073f60e26fd2b0ba761b4e0b98c60b27fdce68fc839cccfdd5732c497a

  • SHA512

    43547b414c49dbf545c98ad9a14728a2bd2c23c760a85a2a65e703bf17e8172e652517e99feb19af8d6cfbc580c1d56dedb91c1b06ec89edc51b72babe4216df

  • SSDEEP

    384:nJpVOCUtDqYCfRgGW6DBi9+eY77Ybrvgp5E9fWWq53txEXM/Y:nJTOtFqRfqGW6N4g71pu9fWWq53ET

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.4430be82a353203babc9a38ea933ec20.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.4430be82a353203babc9a38ea933ec20.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Users\Admin\AppData\Local\Temp\cfinst.exe
      "C:\Users\Admin\AppData\Local\Temp\cfinst.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:3828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\19C0079C970A31C0644ECCFA9BDD4E6B

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\19C0079C970A31C0644ECCFA9BDD4E6B

    Filesize

    418B

    MD5

    b5c5427cf090483d12014c9ff1a1a7b4

    SHA1

    1267bab44923a4d77bd42deddc1d462fc54411b0

    SHA256

    25c3e827f9214ce389b7809992bb5da4e1745823a65326a2bbbe8f38ffa0214d

    SHA512

    4a85f1108939e17d4aac07740e97c40663048b5dac5dc191365c2cbc2d955317c40f3c20cd488569e6af79f28258153f01334923f44979c4e92c8d8e5e1c2684

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\19C0079C970A31C0644ECCFA9BDD4E6B

    Filesize

    418B

    MD5

    f9d712265988e0c2b2bb2cec298eb5a4

    SHA1

    dbe07a7f57dd9693cd041deb586c3387589e71ce

    SHA256

    1fbc8ab8e46816d4a5ac4b671d8805e540ef8ea9f31051effbcfacbb1d498f05

    SHA512

    b57ae5f7bbecce6c50009383e818f323bd608a2f2cf21fd12cf731fc9299e4dafc2fe6aeaee507371db30427e47306cd6fcbbb2f75675c3ba44b03e1ce6b0d06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\19C0079C970A31C0644ECCFA9BDD4E6B

    Filesize

    418B

    MD5

    286ee64984c7d78a67b55a9bd39d1bc9

    SHA1

    63664e8de015f85fe29f62f1b84418a4939c34f5

    SHA256

    88a1e72d364c68ae6d34b3bfde5e05efd9445f283cb7f9acbd89c716f9e7e363

    SHA512

    c17876e1fe34636ce961ba3194dc18e69154fd40694924fb31b2c05025d18c6c9b47f487801cb4fbf4688d2067772e66b3a6fcaaec75d6439f5195c81221a8c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\19C0079C970A31C0644ECCFA9BDD4E6B

    Filesize

    418B

    MD5

    8758e8c027cb0f957a51ad3edbb68cd1

    SHA1

    12600f7a7cebd88f0da532bdef67ad298b1231fc

    SHA256

    43ec0cccbf95b11ff5543d01e1da061869343c8ab2cbdff9e3b5d2f5b1756cac

    SHA512

    00269b0bed13eb1a5c978de6bad399cb916a287fa55bb5543057eae43183fdc94b5d48760b73dbec63e29b9b55ae2b0bbbb83c4aeaabd1ad8f261410e70741fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\19C0079C970A31C0644ECCFA9BDD4E6B

    Filesize

    418B

    MD5

    4b2126a078da9dc3b10e08136fb62668

    SHA1

    3a55766d6e1f226865afa222ba809daffbe32e44

    SHA256

    8331a1df585e00d30314b03d1ba0d3a82d09f297ff100a0e8b57931b293cdb3a

    SHA512

    822b6871af140c51ab4dcc1f2bcd1f8361eee17e15957922a5d9ba6281b8005f83daaa77ad4ad8d76ecfd2b554ba469e509979f2651a9a8421df84847cd6174c

  • C:\Users\Admin\AppData\Local\Temp\cfinst.exe

    Filesize

    45KB

    MD5

    be708f5b7b3425341d9b9a166b839207

    SHA1

    f296b83f811a4e69f483a18187477ffb33dda5e1

    SHA256

    3d4a881b3423c9afc23c0826ee916a475520805fff766e1774886cd44ca0d2e9

    SHA512

    9a3ae8682dff809819f5b7b80c26aebb0f2f22a05b70a249d451d668dae52282f021528c96b546592a0d3abf804caec942eae6c1eaa078744bf32d1d4cd7394b

  • C:\Users\Admin\AppData\Local\Temp\cfinst.exe

    Filesize

    45KB

    MD5

    be708f5b7b3425341d9b9a166b839207

    SHA1

    f296b83f811a4e69f483a18187477ffb33dda5e1

    SHA256

    3d4a881b3423c9afc23c0826ee916a475520805fff766e1774886cd44ca0d2e9

    SHA512

    9a3ae8682dff809819f5b7b80c26aebb0f2f22a05b70a249d451d668dae52282f021528c96b546592a0d3abf804caec942eae6c1eaa078744bf32d1d4cd7394b

  • C:\Users\Admin\AppData\Local\Temp\cfinst.exe

    Filesize

    45KB

    MD5

    be708f5b7b3425341d9b9a166b839207

    SHA1

    f296b83f811a4e69f483a18187477ffb33dda5e1

    SHA256

    3d4a881b3423c9afc23c0826ee916a475520805fff766e1774886cd44ca0d2e9

    SHA512

    9a3ae8682dff809819f5b7b80c26aebb0f2f22a05b70a249d451d668dae52282f021528c96b546592a0d3abf804caec942eae6c1eaa078744bf32d1d4cd7394b

  • memory/1424-0-0x0000000004000000-0x0000000004010000-memory.dmp

    Filesize

    64KB