Analysis
-
max time kernel
181s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 20:31
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.8e58c900964c6c6a987fc284e23b3350.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.8e58c900964c6c6a987fc284e23b3350.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.8e58c900964c6c6a987fc284e23b3350.exe
-
Size
376KB
-
MD5
8e58c900964c6c6a987fc284e23b3350
-
SHA1
11d97983d82fe650b82ff08c7f5130e324509b53
-
SHA256
8ade8ba36fd01edcc2ed33decbe2b277049b20107ed361e4337e6ba117cbe10b
-
SHA512
31657412048dbbea8d5cc80fc28cb9a03a4b974dc32b0680a7a74d66fdca255e68850af377b1e9780728d7338029ad4009568956d1a34a0285569251b50f3551
-
SSDEEP
6144:YVTarW9Q2d06VPAKovnQUvmmAF7J77777S40XB7:YVmrW9HNPGvnQUvmmAF7J77777SnXB7
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation NEAS.8e58c900964c6c6a987fc284e23b3350.exe -
Executes dropped EXE 1 IoCs
pid Process 2920 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\1ea2a93d\jusched.exe NEAS.8e58c900964c6c6a987fc284e23b3350.exe File created C:\Program Files (x86)\1ea2a93d\1ea2a93d NEAS.8e58c900964c6c6a987fc284e23b3350.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job NEAS.8e58c900964c6c6a987fc284e23b3350.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3356 wrote to memory of 2920 3356 NEAS.8e58c900964c6c6a987fc284e23b3350.exe 93 PID 3356 wrote to memory of 2920 3356 NEAS.8e58c900964c6c6a987fc284e23b3350.exe 93 PID 3356 wrote to memory of 2920 3356 NEAS.8e58c900964c6c6a987fc284e23b3350.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.8e58c900964c6c6a987fc284e23b3350.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.8e58c900964c6c6a987fc284e23b3350.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Program Files (x86)\1ea2a93d\jusched.exe"C:\Program Files (x86)\1ea2a93d\jusched.exe"2⤵
- Executes dropped EXE
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD5209aa6c14d66621f3aa1cee03a8bf5dc
SHA10f5bce2a29d3306586934b6d846a172078ee8e66
SHA25657ef9e3c809cf3ca41782d4c7119c3ae7e43ccbb1c00d978b745677f14b82c2e
SHA5128b9fb2bcc8e8785a48d3fe212f852c2f108ef2ab20e9e2a61e9bba5857002abe9111e42411bfc573e50c126031b7ef0433bddfa357de2ca0814f7d31157b9c63
-
Filesize
377KB
MD51b9f8fe2c1864f586f645eea03dff960
SHA11f0a146eda8efdedd5198efa96ed2bb5bd1d1293
SHA25674e0282e3184ddbd7b2dd09bf5e7246ee6fc833c71e4c2347d60632a9cee6d47
SHA5125f8435e23b52be6b12ea8c70c0a6a8504f6f391e03b1e2db822119a5ee7ea642a254139fc6dd980c525f9e6f08a1a589180d7f59b20ec96033989d0232360ac5
-
Filesize
377KB
MD51b9f8fe2c1864f586f645eea03dff960
SHA11f0a146eda8efdedd5198efa96ed2bb5bd1d1293
SHA25674e0282e3184ddbd7b2dd09bf5e7246ee6fc833c71e4c2347d60632a9cee6d47
SHA5125f8435e23b52be6b12ea8c70c0a6a8504f6f391e03b1e2db822119a5ee7ea642a254139fc6dd980c525f9e6f08a1a589180d7f59b20ec96033989d0232360ac5
-
Filesize
377KB
MD51b9f8fe2c1864f586f645eea03dff960
SHA11f0a146eda8efdedd5198efa96ed2bb5bd1d1293
SHA25674e0282e3184ddbd7b2dd09bf5e7246ee6fc833c71e4c2347d60632a9cee6d47
SHA5125f8435e23b52be6b12ea8c70c0a6a8504f6f391e03b1e2db822119a5ee7ea642a254139fc6dd980c525f9e6f08a1a589180d7f59b20ec96033989d0232360ac5