Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2023 08:24
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.fc77b8a2f2192a63ab32391b4c4c5690.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.fc77b8a2f2192a63ab32391b4c4c5690.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.fc77b8a2f2192a63ab32391b4c4c5690.exe
-
Size
32KB
-
MD5
fc77b8a2f2192a63ab32391b4c4c5690
-
SHA1
cd9a152f56185291b8ca354008e7fc3ce699418f
-
SHA256
926a4569c3ad16acee753993d5f867a3e4b8667777e1e437eb62dcbbfda91acd
-
SHA512
478a23051d4b303123de552e2920e33951c12bb8644378f2ee7dcdae79e5d7795fe0c5a276ff6537542df3bca7b6be329f29829880e87dd363f7af1a9a2629bb
-
SSDEEP
384:/QaQWRIgS3Wvr+DipTy08EqgBq+MmOjso7D4bHIin+5amcz/CzZQ0OgP7iOUG7:/fhR+SEipTyC3Bq+MFhC+5amYCNMOF7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation NEAS.fc77b8a2f2192a63ab32391b4c4c5690.exe -
Executes dropped EXE 1 IoCs
pid Process 4756 budha.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3700 wrote to memory of 4756 3700 NEAS.fc77b8a2f2192a63ab32391b4c4c5690.exe 86 PID 3700 wrote to memory of 4756 3700 NEAS.fc77b8a2f2192a63ab32391b4c4c5690.exe 86 PID 3700 wrote to memory of 4756 3700 NEAS.fc77b8a2f2192a63ab32391b4c4c5690.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.fc77b8a2f2192a63ab32391b4c4c5690.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.fc77b8a2f2192a63ab32391b4c4c5690.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:4756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD53b6d8205687d3ed8bf983a42547148b5
SHA1d5b164379788b405d788602c6535e0f1432b4370
SHA256aace5272059a7d10d6358fbcc2d0d099da7acd3af36b1000563651adda0c90eb
SHA512b6f6f38146de808b3cd881389d12e76457f6569f7a89f535755931b1dcda5ca178ad374ad1c314e7ef5f0e6f895c9eeaea36b56b747a25d1e835a3e1e3548b16
-
Filesize
32KB
MD53b6d8205687d3ed8bf983a42547148b5
SHA1d5b164379788b405d788602c6535e0f1432b4370
SHA256aace5272059a7d10d6358fbcc2d0d099da7acd3af36b1000563651adda0c90eb
SHA512b6f6f38146de808b3cd881389d12e76457f6569f7a89f535755931b1dcda5ca178ad374ad1c314e7ef5f0e6f895c9eeaea36b56b747a25d1e835a3e1e3548b16
-
Filesize
32KB
MD53b6d8205687d3ed8bf983a42547148b5
SHA1d5b164379788b405d788602c6535e0f1432b4370
SHA256aace5272059a7d10d6358fbcc2d0d099da7acd3af36b1000563651adda0c90eb
SHA512b6f6f38146de808b3cd881389d12e76457f6569f7a89f535755931b1dcda5ca178ad374ad1c314e7ef5f0e6f895c9eeaea36b56b747a25d1e835a3e1e3548b16