Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/10/2023, 17:41

General

  • Target

    NEAS.c92f16d48d64bac81700e68374315bd0_JC.exe

  • Size

    2.8MB

  • MD5

    c92f16d48d64bac81700e68374315bd0

  • SHA1

    42d8940d93de2b7157134508e2e59c10648b8102

  • SHA256

    043f5701fe83eb223229af5650754980b6130940a74f30c1bdada3a42f19985c

  • SHA512

    82d22d78be5f3d573c293dd6b39376cadfb6bbdc4f639c3c2fc45baced812d2996a74c623ad25bab3fb62e4fe90b2392a5649d66975d127ad7e78f5356f51099

  • SSDEEP

    49152:Z0rLf0ZwHakjEsjtoG1q8AMz8DOXTDGWUaTw:Zof0ZhkXjtoGlAMz8DqTD9Ua

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.c92f16d48d64bac81700e68374315bd0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.c92f16d48d64bac81700e68374315bd0_JC.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Windows\SysWOW64\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\error.log
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:4372

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\error.log

          Filesize

          9KB

          MD5

          c52821a39fd9f9d7a55b7f89ba490f59

          SHA1

          d5ebc58cab1ddf8821a97eef77b813e45bebc005

          SHA256

          fe6548267b6ca20ff4101f9369096c5b04f3bc939ef479a14f59dedee5d9d3a1

          SHA512

          5f99f9d97752f31553c91797823fd9374aa964a901e8dd8c78ad85dd5ef9c7a2404404ad837f29589dc818313b4998916a48b154e9974b4d692ca3476b026349