Analysis

  • max time kernel
    142s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/10/2023, 21:24

General

  • Target

    NEAS.811ec78310f03766634cf0206a28c8e0.exe

  • Size

    1.2MB

  • MD5

    811ec78310f03766634cf0206a28c8e0

  • SHA1

    695838871b614cb538cf1229fad53cd09f00eb76

  • SHA256

    7c621d6041e47daf35525e0bfbd86925e4a4c5fdfdb7c48e03755fe3a2e6fe72

  • SHA512

    6ee7137b0049badf364866fd7c5a25c51140b4d784777bec7e5ac85e1944582e9cdb48ad374bd8a1feba06c4e3e1ad7139fdfb97856130bb074a1a0ca9bde51a

  • SSDEEP

    24576:GHXXX/XXXFqIIIcXXX5j2XXXcXXXfXXXxXXXLIII+Ph2kkkkK4kXkkkkkkkkhLX1:G9qIIIUjfIIIAbazR0vKLXZk

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.811ec78310f03766634cf0206a28c8e0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.811ec78310f03766634cf0206a28c8e0.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3616
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\NEAS81~1.EXE > nul
      2⤵
        PID:4360
    • C:\Windows\Debug\bqchost.exe
      C:\Windows\Debug\bqchost.exe
      1⤵
      • Executes dropped EXE
      • Checks processor information in registry
      PID:1968

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Debug\bqchost.exe

      Filesize

      1.2MB

      MD5

      d779cd83aaf1103adf8fbf6ca4d089f9

      SHA1

      4f33dae76c94bd2f9b33eec7848d82d77f3b3aef

      SHA256

      8279bd45e0bff1a33eadefb61adfacde0ef4cef4c0746e315753af666788c9ff

      SHA512

      724c2266b7c0ac72ff3e4e717b32e54e4ba1f8a731a29506f8144225f82c74040cb7271dfc54a3f8618b8348d3611866a632c76c53b315088eed551d0be56455

    • C:\Windows\debug\bqchost.exe

      Filesize

      1.2MB

      MD5

      d779cd83aaf1103adf8fbf6ca4d089f9

      SHA1

      4f33dae76c94bd2f9b33eec7848d82d77f3b3aef

      SHA256

      8279bd45e0bff1a33eadefb61adfacde0ef4cef4c0746e315753af666788c9ff

      SHA512

      724c2266b7c0ac72ff3e4e717b32e54e4ba1f8a731a29506f8144225f82c74040cb7271dfc54a3f8618b8348d3611866a632c76c53b315088eed551d0be56455