Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe
-
Size
1.3MB
-
MD5
f1cfdf9975d6f293b2dcdac85b1e3b30
-
SHA1
5871f5c3527296814bcd19aa7726ae78f5b03b03
-
SHA256
bfe5047328dffa0c64c051fef38e6dc8c95f2daf9d6876f2b4de865691b90908
-
SHA512
1710bb9b85e77505cb00186a54b7c22ac40d12f8bc26fe6b31759bdd5aa5b2f02484a65696b06a9302429830f2728b55408f50daff8a5755f6bbbc18db73ff5f
-
SSDEEP
24576:VKE9Gtt/hMTW9PWpfXz3bMi7bPdIKyew0O1IA1UiuLHgZpJEGge:VYhMTWstMUbPdIdewL1IDiuLHkJEE
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1511405631-3522522280-778892991-1000\Control Panel\International\Geo\Nation NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe Key value queried \REGISTRY\USER\S-1-5-21-1511405631-3522522280-778892991-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 3200 ._cache_NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe 672 Synaptics.exe 4212 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe -
NTFS ADS 8 IoCs
description ioc Process File opened for modification C:\ProgramData\DYA_RFVEFSPQPULUKLRTH\1.0.0:$SS_DESCRIPTOR_SBXNV9VVGV1BFX69KP6FJDB96GLK0M060BPBGLPFSVF7JB4VPJGV Synaptics.exe File opened for modification C:\ProgramData\DYA_RFVEFSPQPULUKLRTH\1.0.0:$SS_DESCRIPTOR_ Synaptics.exe File created C:\Users\Public\Desktop:$SS_DESCRIPTOR_SBXNV9VVGV1BFX69KP6FJDB96GLK0M060BPBGLPFSVF7JB4VPJGV Synaptics.exe File opened for modification C:\ProgramData:$SS_DESCRIPTOR_SBXNV9VVGV1BFX69KP6FJDB96GLK0M060BPBGLPFSVF7JB4VPJGV Synaptics.exe File opened for modification C:\ProgramData:$SS_DESCRIPTOR_ Synaptics.exe File created C:\ProgramData:$SS_DESCRIPTOR_SBXNV9VVGV1BFX69KP6FJDB96GLK0M060BPBGLPFSVF7JB4VPJGV NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe File created C:\ProgramData\DYA_RFVEFSPQPULUKLRTH\1.0.0:$SS_DESCRIPTOR_SBXNV9VVGV1BFX69KP6FJDB96GLK0M060BPBGLPFSVF7JB4VPJGV NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe File created C:\Users\Public\Desktop:$SS_DESCRIPTOR_SBXNV9VVGV1BFX69KP6FJDB96GLK0M060BPBGLPFSVF7JB4VPJGV NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4128 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1308 NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe 1308 NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe 1308 NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe 1308 NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe 1308 NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe 1308 NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe 672 Synaptics.exe 672 Synaptics.exe 672 Synaptics.exe 672 Synaptics.exe 672 Synaptics.exe 672 Synaptics.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4128 EXCEL.EXE 4128 EXCEL.EXE 4128 EXCEL.EXE 4128 EXCEL.EXE 4128 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1308 wrote to memory of 3200 1308 NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe 90 PID 1308 wrote to memory of 3200 1308 NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe 90 PID 1308 wrote to memory of 3200 1308 NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe 90 PID 1308 wrote to memory of 672 1308 NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe 91 PID 1308 wrote to memory of 672 1308 NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe 91 PID 1308 wrote to memory of 672 1308 NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe 91 PID 672 wrote to memory of 4212 672 Synaptics.exe 93 PID 672 wrote to memory of 4212 672 Synaptics.exe 93 PID 672 wrote to memory of 4212 672 Synaptics.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\._cache_NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe"C:\Users\Admin\AppData\Local\Temp\._cache_NEAS.f1cfdf9975d6f293b2dcdac85b1e3b30_JC.exe"2⤵
- Executes dropped EXE
PID:3200
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:4212
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
971B
MD523db2ff2fe5a958effdd9fef9e9e24e7
SHA14b24e5725ae8334961ffcf5e1219e25097c77690
SHA2563fddda932ad9129448988fb26b35074f561f56a10327280cb320809d0118d565
SHA512e67231b0912a6bd2e72edc854a26ccfc465ff765a9452100fa177c2c5ebb6df0a40a9eeb9d479a4c9525aaaf66de8ad0259cf4dff42b8cfb795c4804a4c47065
-
C:\ProgramData\DYA_RFVEFSPQPULUKLRTH\1.0.0:$SS_DESCRIPTOR_SBXNV9VVGV1BFX69KP6FJDB96GLK0M060BPBGLPFSVF7JB4VPJGV
Filesize971B
MD517758c716f26a232291c2f5403d184fa
SHA162507410aed954d21a5a93489dff8819bd1a469b
SHA2565a4ce4362792cf9448c00904f686680304f8796f4c9ebd6a5098c9fbdcb2bdde
SHA5125117786c1901bc4c850258fe968d02987f0b2ddb9335b022704f75dddec22605687fe612b2f5a7f351e583a4e78b699be59b0018f8a44ba79b5ed35efa00fcc8
-
Filesize
971B
MD5786984ae028e21dced4646bbb9db7555
SHA1f583d95b69c0065a1c29bfa2f77269e1d81fc4f8
SHA256407017650cc50bf1caa7af48efd651b14ee520e1a7cffdd6d63483901ed3d486
SHA512565cc85f3a84ae93ede8a7161f4fb191f939b77a729c5e9d7350c18255df599f8b628595e4e9c18fe150ce8ada01ee99d2a0de315c24f73fc8e86244fa7876e1
-
Filesize
971B
MD5786984ae028e21dced4646bbb9db7555
SHA1f583d95b69c0065a1c29bfa2f77269e1d81fc4f8
SHA256407017650cc50bf1caa7af48efd651b14ee520e1a7cffdd6d63483901ed3d486
SHA512565cc85f3a84ae93ede8a7161f4fb191f939b77a729c5e9d7350c18255df599f8b628595e4e9c18fe150ce8ada01ee99d2a0de315c24f73fc8e86244fa7876e1
-
Filesize
971B
MD56f56162ac7bfdc42d97e6e7bfc97ec30
SHA175e7d722b5c3da4daac2b420f1676bb90db76983
SHA2565040a0ce016ba49dc4ccc011b1346373cd6c0a197985a826214c34855e594a86
SHA512bfe3607130d4b5d5793f41f028e3fa794791cffe81e39515aa7ac725fad860a97626ee407aecef2cf7174d0034d1e9bef401a921daf04b8dcc19cb1f9444b3bb
-
Filesize
971B
MD56f56162ac7bfdc42d97e6e7bfc97ec30
SHA175e7d722b5c3da4daac2b420f1676bb90db76983
SHA2565040a0ce016ba49dc4ccc011b1346373cd6c0a197985a826214c34855e594a86
SHA512bfe3607130d4b5d5793f41f028e3fa794791cffe81e39515aa7ac725fad860a97626ee407aecef2cf7174d0034d1e9bef401a921daf04b8dcc19cb1f9444b3bb
-
Filesize
1.3MB
MD5f1cfdf9975d6f293b2dcdac85b1e3b30
SHA15871f5c3527296814bcd19aa7726ae78f5b03b03
SHA256bfe5047328dffa0c64c051fef38e6dc8c95f2daf9d6876f2b4de865691b90908
SHA5121710bb9b85e77505cb00186a54b7c22ac40d12f8bc26fe6b31759bdd5aa5b2f02484a65696b06a9302429830f2728b55408f50daff8a5755f6bbbc18db73ff5f
-
Filesize
1.3MB
MD5f1cfdf9975d6f293b2dcdac85b1e3b30
SHA15871f5c3527296814bcd19aa7726ae78f5b03b03
SHA256bfe5047328dffa0c64c051fef38e6dc8c95f2daf9d6876f2b4de865691b90908
SHA5121710bb9b85e77505cb00186a54b7c22ac40d12f8bc26fe6b31759bdd5aa5b2f02484a65696b06a9302429830f2728b55408f50daff8a5755f6bbbc18db73ff5f
-
Filesize
1.3MB
MD5f1cfdf9975d6f293b2dcdac85b1e3b30
SHA15871f5c3527296814bcd19aa7726ae78f5b03b03
SHA256bfe5047328dffa0c64c051fef38e6dc8c95f2daf9d6876f2b4de865691b90908
SHA5121710bb9b85e77505cb00186a54b7c22ac40d12f8bc26fe6b31759bdd5aa5b2f02484a65696b06a9302429830f2728b55408f50daff8a5755f6bbbc18db73ff5f
-
Filesize
507KB
MD5c87e561258f2f8650cef999bf643a731
SHA12c64b901284908e8ed59cf9c912f17d45b05e0af
SHA256a1dfa6639bef3cb4e41175c43730d46a51393942ead826337ca9541ac210c67b
SHA512dea4833aa712c5823f800f5f5a2adcf241c1b2b6747872f540f5ff9da6795c4ddb73db0912593337083c7c67b91e9eaf1b3d39a34b99980fd5904ba3d7d62f6c
-
Filesize
507KB
MD5c87e561258f2f8650cef999bf643a731
SHA12c64b901284908e8ed59cf9c912f17d45b05e0af
SHA256a1dfa6639bef3cb4e41175c43730d46a51393942ead826337ca9541ac210c67b
SHA512dea4833aa712c5823f800f5f5a2adcf241c1b2b6747872f540f5ff9da6795c4ddb73db0912593337083c7c67b91e9eaf1b3d39a34b99980fd5904ba3d7d62f6c
-
Filesize
507KB
MD5c87e561258f2f8650cef999bf643a731
SHA12c64b901284908e8ed59cf9c912f17d45b05e0af
SHA256a1dfa6639bef3cb4e41175c43730d46a51393942ead826337ca9541ac210c67b
SHA512dea4833aa712c5823f800f5f5a2adcf241c1b2b6747872f540f5ff9da6795c4ddb73db0912593337083c7c67b91e9eaf1b3d39a34b99980fd5904ba3d7d62f6c
-
Filesize
507KB
MD5c87e561258f2f8650cef999bf643a731
SHA12c64b901284908e8ed59cf9c912f17d45b05e0af
SHA256a1dfa6639bef3cb4e41175c43730d46a51393942ead826337ca9541ac210c67b
SHA512dea4833aa712c5823f800f5f5a2adcf241c1b2b6747872f540f5ff9da6795c4ddb73db0912593337083c7c67b91e9eaf1b3d39a34b99980fd5904ba3d7d62f6c
-
Filesize
507KB
MD5c87e561258f2f8650cef999bf643a731
SHA12c64b901284908e8ed59cf9c912f17d45b05e0af
SHA256a1dfa6639bef3cb4e41175c43730d46a51393942ead826337ca9541ac210c67b
SHA512dea4833aa712c5823f800f5f5a2adcf241c1b2b6747872f540f5ff9da6795c4ddb73db0912593337083c7c67b91e9eaf1b3d39a34b99980fd5904ba3d7d62f6c
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
971B
MD5ab7fd29497627fcb871996458ce3de7e
SHA13d419c155c1e57cc30c0a64d61ad83efbd560729
SHA256a735d01ff0abb0f555b002d9b4c5d24ef4bce7adab195ae5d00bc922954321b7
SHA512d2471cd8c1461f582339bae8c013ced372953faea1ff2394c000fd5683d662624097f876f05f0344a592aae10a02ef958bf7936a5064589d39ce46aaa7316dda
-
Filesize
971B
MD5ab7fd29497627fcb871996458ce3de7e
SHA13d419c155c1e57cc30c0a64d61ad83efbd560729
SHA256a735d01ff0abb0f555b002d9b4c5d24ef4bce7adab195ae5d00bc922954321b7
SHA512d2471cd8c1461f582339bae8c013ced372953faea1ff2394c000fd5683d662624097f876f05f0344a592aae10a02ef958bf7936a5064589d39ce46aaa7316dda