Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 17:41
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.c92f16d48d64bac81700e68374315bd0_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.c92f16d48d64bac81700e68374315bd0_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.c92f16d48d64bac81700e68374315bd0_JC.exe
-
Size
2.8MB
-
MD5
c92f16d48d64bac81700e68374315bd0
-
SHA1
42d8940d93de2b7157134508e2e59c10648b8102
-
SHA256
043f5701fe83eb223229af5650754980b6130940a74f30c1bdada3a42f19985c
-
SHA512
82d22d78be5f3d573c293dd6b39376cadfb6bbdc4f639c3c2fc45baced812d2996a74c623ad25bab3fb62e4fe90b2392a5649d66975d127ad7e78f5356f51099
-
SSDEEP
49152:Z0rLf0ZwHakjEsjtoG1q8AMz8DOXTDGWUaTw:Zof0ZhkXjtoGlAMz8DqTD9Ua
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation NEAS.c92f16d48d64bac81700e68374315bd0_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings NEAS.c92f16d48d64bac81700e68374315bd0_JC.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4372 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2540 NEAS.c92f16d48d64bac81700e68374315bd0_JC.exe 2540 NEAS.c92f16d48d64bac81700e68374315bd0_JC.exe 2540 NEAS.c92f16d48d64bac81700e68374315bd0_JC.exe 2540 NEAS.c92f16d48d64bac81700e68374315bd0_JC.exe 2540 NEAS.c92f16d48d64bac81700e68374315bd0_JC.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2540 wrote to memory of 4372 2540 NEAS.c92f16d48d64bac81700e68374315bd0_JC.exe 90 PID 2540 wrote to memory of 4372 2540 NEAS.c92f16d48d64bac81700e68374315bd0_JC.exe 90 PID 2540 wrote to memory of 4372 2540 NEAS.c92f16d48d64bac81700e68374315bd0_JC.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.c92f16d48d64bac81700e68374315bd0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.c92f16d48d64bac81700e68374315bd0_JC.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\error.log2⤵
- Opens file in notepad (likely ransom note)
PID:4372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5c52821a39fd9f9d7a55b7f89ba490f59
SHA1d5ebc58cab1ddf8821a97eef77b813e45bebc005
SHA256fe6548267b6ca20ff4101f9369096c5b04f3bc939ef479a14f59dedee5d9d3a1
SHA5125f99f9d97752f31553c91797823fd9374aa964a901e8dd8c78ad85dd5ef9c7a2404404ad837f29589dc818313b4998916a48b154e9974b4d692ca3476b026349