Analysis
-
max time kernel
199s -
max time network
220s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2023 17:52
Behavioral task
behavioral1
Sample
NEAS.5c0f0962b050399f72bffc051720c165.exe
Resource
win7-20231020-en
General
-
Target
NEAS.5c0f0962b050399f72bffc051720c165.exe
-
Size
195KB
-
MD5
5c0f0962b050399f72bffc051720c165
-
SHA1
58dd5d89316c04d92997e85f8a18fe7b339155e7
-
SHA256
8cedfb1d7306c80e93b354efbcaf1fb1913ac74079bd36e43f753740a7253ae6
-
SHA512
bf681ba986bee0b88345c82e38d4eea22bcaccdd557e066e466fa0fb957b1a0ec18f28a436755be96b404b51da67c268de463f14463f7b45bb76e6e3cf72b830
-
SSDEEP
3072:ulOCNlACeMKV6ETiiXd60iuic+XzoWad5N443nsexP:ugCNSv6p8lec+cTiqsexP
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Control Panel\International\Geo\Nation NEAS.5c0f0962b050399f72bffc051720c165.exe -
Executes dropped EXE 1 IoCs
pid Process 4356 biudfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2344 wrote to memory of 4356 2344 NEAS.5c0f0962b050399f72bffc051720c165.exe 90 PID 2344 wrote to memory of 4356 2344 NEAS.5c0f0962b050399f72bffc051720c165.exe 90 PID 2344 wrote to memory of 4356 2344 NEAS.5c0f0962b050399f72bffc051720c165.exe 90 PID 2344 wrote to memory of 5068 2344 NEAS.5c0f0962b050399f72bffc051720c165.exe 91 PID 2344 wrote to memory of 5068 2344 NEAS.5c0f0962b050399f72bffc051720c165.exe 91 PID 2344 wrote to memory of 5068 2344 NEAS.5c0f0962b050399f72bffc051720c165.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5c0f0962b050399f72bffc051720c165.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5c0f0962b050399f72bffc051720c165.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
PID:4356
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵PID:5068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195KB
MD5fe1c1fc6efd5a18ca047e71b4c160402
SHA1780c09f80bd4589f2db749734982c08793e290c5
SHA256a8ae02fc336815bba40cf7c4134002deb3d341857b2a5e2725d73d527153d256
SHA512ac31d54168a1136cdfbea4da551e2e0142c3b33c4aee603d0124bbd5b85dea773cefeea602cfe0c8703007b956514c270653d00b00e9a933370e98d4ac421a7b
-
Filesize
195KB
MD5fe1c1fc6efd5a18ca047e71b4c160402
SHA1780c09f80bd4589f2db749734982c08793e290c5
SHA256a8ae02fc336815bba40cf7c4134002deb3d341857b2a5e2725d73d527153d256
SHA512ac31d54168a1136cdfbea4da551e2e0142c3b33c4aee603d0124bbd5b85dea773cefeea602cfe0c8703007b956514c270653d00b00e9a933370e98d4ac421a7b
-
Filesize
195KB
MD5fe1c1fc6efd5a18ca047e71b4c160402
SHA1780c09f80bd4589f2db749734982c08793e290c5
SHA256a8ae02fc336815bba40cf7c4134002deb3d341857b2a5e2725d73d527153d256
SHA512ac31d54168a1136cdfbea4da551e2e0142c3b33c4aee603d0124bbd5b85dea773cefeea602cfe0c8703007b956514c270653d00b00e9a933370e98d4ac421a7b
-
Filesize
512B
MD5ae2bc1a0af002d17af7a85dce0028d6d
SHA1c484b779aaead2f1d9e3b770fb7766f871a45e81
SHA2569e3db9db2402a201b1ea8f8fbd4e0a857b13188d05685bc56ef7bddd88d26571
SHA512c2ff1d2c53fd5b57b8890fab8db7bb5af42a0a88eb3849843e9ea9178c85579fd80c4d1782372be822be347e8466002b9455ec5d5f0c8a97a60b93e720b11975
-
Filesize
284B
MD54a5e58efa5d50eb3658cd8a64d558aea
SHA1b14308182089777db315be0b5dc6de57ec5afb36
SHA25600b22f9db812019d6371144efbaebebf52315abf59cdfd5a9e0c820ab349cc00
SHA512df1686acbc3e36a00d2c81b33f49198635250a01872c0ff7a875b0caa6f18ff2e65989fc3362e551334f4aa2d76964cba5d3eeac956953aeb842e2a5dd43d194