Analysis

  • max time kernel
    150s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2023, 18:07

General

  • Target

    NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe

  • Size

    324KB

  • MD5

    9b26ff6418e56cff485a9ccc8c066f90

  • SHA1

    e1e722ffc64246de79ccd6df19decc1daba32feb

  • SHA256

    81cff47887f6a46c2ebb25b2ff826a9a398ff1f64f0fe1d7b92a60b3883b58b3

  • SHA512

    190244c1e754e92afc7de3915cdd3ad76c547e9234ee278fa5f383851fd003c627fddda4c80320b6840f51b38df3790baea0feee1b28cbdc821a98d14a72bf54

  • SSDEEP

    6144:/pW2bgbbV28okoS1oWMkdlZQ5wQgid3vTv:/pW2IoioS6FL

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Disables Task Manager via registry modification
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 10 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:904
    • C:\Windows\System32\reg.exe
      "C:\Windows\System32\reg.exe" ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
      2⤵
      • UAC bypass
      • Modifies registry key
      PID:3980
    • C:\Windows\System32\reg.exe
      "C:\Windows\System32\reg.exe" add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
      2⤵
      • Modifies registry key
      PID:3596

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\54Ta229CACm.exe

          Filesize

          324KB

          MD5

          5407ada85fb9be2456c6d599e4a34cdd

          SHA1

          b17bcb0d9888d645e4a0b4a58d5339cbb2af38de

          SHA256

          ca73cbdacb3d5ee0b81a4b19a300a3f8b975f8afc0ad88001c32020dc1c9f980

          SHA512

          9f5eb7065b8289c8bdb10079a26fd85e5b753ac7de161d141cb7aa213066c09ed25f4964abf8798b6b4745a78a3bc8c777db5e66c7cfd9489bd3d061e959e491

        • memory/904-0-0x000002942DAF0000-0x000002942DB18000-memory.dmp

          Filesize

          160KB

        • memory/904-1-0x00007FFE77440000-0x00007FFE77F01000-memory.dmp

          Filesize

          10.8MB

        • memory/904-2-0x00000294482E0000-0x00000294482F0000-memory.dmp

          Filesize

          64KB

        • memory/904-384-0x00007FFE77440000-0x00007FFE77F01000-memory.dmp

          Filesize

          10.8MB

        • memory/904-585-0x00000294482F0000-0x0000029448499000-memory.dmp

          Filesize

          1.7MB

        • memory/904-606-0x00000294482E0000-0x00000294482F0000-memory.dmp

          Filesize

          64KB