Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.25363dc16a3758827dfb410343cdbcd0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.25363dc16a3758827dfb410343cdbcd0.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.25363dc16a3758827dfb410343cdbcd0.exe
-
Size
33KB
-
MD5
25363dc16a3758827dfb410343cdbcd0
-
SHA1
0e6b6e3537eefe353927521912d09a5f4b3150b1
-
SHA256
6066dde245686a939ae57d21a97ae35f104560eb5139024e8b929eedc4fedb0c
-
SHA512
20350c2b31388b1e1012caac85f726cc1452e1381e8a4c233bd4c3d931b73ef7ab5e3735dc206815e93223c668ecc190bc99baa25528d52b82c7cdd9dd2fbe58
-
SSDEEP
768:b/zG9lCapIyMdnfj5PseRQW63GNSI/DWua:ba9lDpInGAWUSMy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation NEAS.25363dc16a3758827dfb410343cdbcd0.exe -
Executes dropped EXE 1 IoCs
pid Process 3672 hots.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5024 wrote to memory of 3672 5024 NEAS.25363dc16a3758827dfb410343cdbcd0.exe 84 PID 5024 wrote to memory of 3672 5024 NEAS.25363dc16a3758827dfb410343cdbcd0.exe 84 PID 5024 wrote to memory of 3672 5024 NEAS.25363dc16a3758827dfb410343cdbcd0.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.25363dc16a3758827dfb410343cdbcd0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.25363dc16a3758827dfb410343cdbcd0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\hots.exe"C:\Users\Admin\AppData\Local\Temp\hots.exe"2⤵
- Executes dropped EXE
PID:3672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5ba737dbd6e4978168a902f1442da7dde
SHA10862cd0259d97a7fb7617a3492492d444347a18b
SHA2566e5e93b13a2af9bdd4c7aabc00b97492578ce72503c5490439f138f85da00088
SHA5129a7509c5da07a6308693e7f9b80c20939895d1847e11b658c931fb9f9f58b5a25b02430b100945f4819c971196310d3b570638d3a3174001bcac3a0b93b7f845
-
Filesize
33KB
MD5ba737dbd6e4978168a902f1442da7dde
SHA10862cd0259d97a7fb7617a3492492d444347a18b
SHA2566e5e93b13a2af9bdd4c7aabc00b97492578ce72503c5490439f138f85da00088
SHA5129a7509c5da07a6308693e7f9b80c20939895d1847e11b658c931fb9f9f58b5a25b02430b100945f4819c971196310d3b570638d3a3174001bcac3a0b93b7f845
-
Filesize
33KB
MD5ba737dbd6e4978168a902f1442da7dde
SHA10862cd0259d97a7fb7617a3492492d444347a18b
SHA2566e5e93b13a2af9bdd4c7aabc00b97492578ce72503c5490439f138f85da00088
SHA5129a7509c5da07a6308693e7f9b80c20939895d1847e11b658c931fb9f9f58b5a25b02430b100945f4819c971196310d3b570638d3a3174001bcac3a0b93b7f845