Analysis
-
max time kernel
161s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2023 11:34
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe
-
Size
340KB
-
MD5
0b2ca15b3f0c2af1ee646d50f9917d20
-
SHA1
839b2b3b09f5947fe6818e925feeb0af97d3f603
-
SHA256
dfa83e0a985772156d60061f77cebcf1d7e6569c57704ba567cb7eb9e1fee802
-
SHA512
2bc66352a39c2edd4bcf005d565368975e6e92195a16a8ae23b2a37e8f74d6792e78d4a473263670017c912cc6ae3614b7e49f28c210d56b412d73a7afea18eb
-
SSDEEP
6144:ztvBPnU1b7e9SQii1EkoNlhlrQ2ZrM2xsyxr8ceQdWTw:Zv1nWdQP1EDhZPxsyFDdWTw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe -
Executes dropped EXE 2 IoCs
pid Process 3744 Isass.exe 4020 HA_NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Program Files (x86)\\Microsoft Build\\Isass.exe" NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Program Files (x86)\\Microsoft Build\\Isass.exe" NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Build\Isass.exe NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3640 NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe 3640 NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe 3744 Isass.exe 3744 Isass.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3640 wrote to memory of 3744 3640 NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe 88 PID 3640 wrote to memory of 3744 3640 NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe 88 PID 3640 wrote to memory of 3744 3640 NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe 88 PID 3640 wrote to memory of 4020 3640 NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe 89 PID 3640 wrote to memory of 4020 3640 NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Program Files (x86)\Microsoft Build\Isass.exe"C:\Program Files (x86)\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3744
-
-
C:\Users\Admin\AppData\Local\Temp\HA_NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe"C:\Users\Admin\AppData\Local\Temp\HA_NEAS.0b2ca15b3f0c2af1ee646d50f9917d20_JC.exe"2⤵
- Executes dropped EXE
PID:4020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD532766791428d36d8752c892633c1ddc4
SHA101d489f3ffdd82b1d3a33d0d4dc5d5bd076ac930
SHA25654fe80d5413a4c94c8063b768715fbaee9555cb1c19f7bf1af22689b20ffbb35
SHA5125e15a2714afdd1f9c2fc1112d973d98e5044d9d96e805b4b7844d8d07637b924cf7f7c350a7f740671f011f6242b4dc1d745bce06ade13a7f02e223c1de7f823
-
Filesize
213KB
MD532766791428d36d8752c892633c1ddc4
SHA101d489f3ffdd82b1d3a33d0d4dc5d5bd076ac930
SHA25654fe80d5413a4c94c8063b768715fbaee9555cb1c19f7bf1af22689b20ffbb35
SHA5125e15a2714afdd1f9c2fc1112d973d98e5044d9d96e805b4b7844d8d07637b924cf7f7c350a7f740671f011f6242b4dc1d745bce06ade13a7f02e223c1de7f823
-
Filesize
725KB
MD571363381ad0dad7374c42b62b2d87182
SHA12fb837b5bab87ff7b19d7bf27869d090ff769c53
SHA256c47e92da4c3ba8f0622d13dbdba76bbd1a5c2007093e2245286f773606f5a94d
SHA5122bf461686b0f2061c094111c13d6101efa7617fa998ebc323d659c8130da9b5258b7743cefed4faffd3a32d128919c999c8ff9295b0db5a2c43a34e8b3dcf5c6
-
Filesize
99KB
MD5add15a53fd06b29b67959d7a527b16b7
SHA1a93b3d6d129e3f99e32b6c2ea6a96e896c090b1a
SHA256786e68ded8af18f36274d78ea00ff11289c27107dd9f8fdd2f6b4732a3b8a2da
SHA512ff7b4461448820a8a7f09f5b0282dd4fd042050072719838ab72dc6f8aac9e25982b568dbb2ba9877db2b66018bda46043fd98ef123c07af446b1fb161be2430
-
Filesize
99KB
MD5add15a53fd06b29b67959d7a527b16b7
SHA1a93b3d6d129e3f99e32b6c2ea6a96e896c090b1a
SHA256786e68ded8af18f36274d78ea00ff11289c27107dd9f8fdd2f6b4732a3b8a2da
SHA512ff7b4461448820a8a7f09f5b0282dd4fd042050072719838ab72dc6f8aac9e25982b568dbb2ba9877db2b66018bda46043fd98ef123c07af446b1fb161be2430