Analysis
-
max time kernel
150s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 18:07
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe
-
Size
324KB
-
MD5
9b26ff6418e56cff485a9ccc8c066f90
-
SHA1
e1e722ffc64246de79ccd6df19decc1daba32feb
-
SHA256
81cff47887f6a46c2ebb25b2ff826a9a398ff1f64f0fe1d7b92a60b3883b58b3
-
SHA512
190244c1e754e92afc7de3915cdd3ad76c547e9234ee278fa5f383851fd003c627fddda4c80320b6840f51b38df3790baea0feee1b28cbdc821a98d14a72bf54
-
SSDEEP
6144:/pW2bgbbV28okoS1oWMkdlZQ5wQgid3vTv:/pW2IoioS6FL
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe BATCF %1" NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe BATCF %1" NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\rtffile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe RTFDF %1" NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inifile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe NTPAD %1" NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe NTPAD %1" NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe NTPAD %1" NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cmdfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe CMDSF %1" NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\giffile\shell\Open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe JPGIF %1" NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe VBSSF %1" NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe HTMWF %1" NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\shell\Open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe NTPAD %1" NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 3980 reg.exe 3596 reg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 904 wrote to memory of 3980 904 NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe 88 PID 904 wrote to memory of 3980 904 NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe 88 PID 904 wrote to memory of 3596 904 NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe 89 PID 904 wrote to memory of 3596 904 NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.9b26ff6418e56cff485a9ccc8c066f90.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- UAC bypass
- Modifies registry key
PID:3980
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f2⤵
- Modifies registry key
PID:3596
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
324KB
MD55407ada85fb9be2456c6d599e4a34cdd
SHA1b17bcb0d9888d645e4a0b4a58d5339cbb2af38de
SHA256ca73cbdacb3d5ee0b81a4b19a300a3f8b975f8afc0ad88001c32020dc1c9f980
SHA5129f5eb7065b8289c8bdb10079a26fd85e5b753ac7de161d141cb7aa213066c09ed25f4964abf8798b6b4745a78a3bc8c777db5e66c7cfd9489bd3d061e959e491