Analysis
-
max time kernel
189s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2023, 18:03
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.1978093d098dafaa49c4fe49218b7a50.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.1978093d098dafaa49c4fe49218b7a50.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.1978093d098dafaa49c4fe49218b7a50.exe
-
Size
473KB
-
MD5
1978093d098dafaa49c4fe49218b7a50
-
SHA1
d56298d42d3d2a23c3112e1eb6305cf9cff9dd9f
-
SHA256
ffa7cbcfdc97c1bd2b043123d12dfb38754f93e4c9d6ec8d7bbdc8edc555f612
-
SHA512
6c618955be4a4bce11958a986b1b7f9eb9e11ec35cea663aab7432df36047c247b7878c43ba9dc554877a2ad5203147e6237fb4c45fea0d12f22341764c049a2
-
SSDEEP
1536:ur3Z5IfQmv81a1xyXHZ+NGQSLNmCm6oyz7jBd7qDmbNPMJAVC+++f:yJOfQm01mxyXHZKG7pm6j77X
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 5012 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Control Panel\International\Geo\Nation NEAS.1978093d098dafaa49c4fe49218b7a50.exe -
Executes dropped EXE 1 IoCs
pid Process 1480 cwshost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\cwshost.exe NEAS.1978093d098dafaa49c4fe49218b7a50.exe File opened for modification C:\Windows\Debug\cwshost.exe NEAS.1978093d098dafaa49c4fe49218b7a50.exe File opened for modification C:\Windows\Debug\cwshost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4112 NEAS.1978093d098dafaa49c4fe49218b7a50.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4112 wrote to memory of 5012 4112 NEAS.1978093d098dafaa49c4fe49218b7a50.exe 88 PID 4112 wrote to memory of 5012 4112 NEAS.1978093d098dafaa49c4fe49218b7a50.exe 88 PID 4112 wrote to memory of 5012 4112 NEAS.1978093d098dafaa49c4fe49218b7a50.exe 88 PID 4112 wrote to memory of 948 4112 NEAS.1978093d098dafaa49c4fe49218b7a50.exe 93 PID 4112 wrote to memory of 948 4112 NEAS.1978093d098dafaa49c4fe49218b7a50.exe 93 PID 4112 wrote to memory of 948 4112 NEAS.1978093d098dafaa49c4fe49218b7a50.exe 93 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5012 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.1978093d098dafaa49c4fe49218b7a50.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.1978093d098dafaa49c4fe49218b7a50.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\cwshost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:5012
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\NEAS19~1.EXE > nul2⤵PID:948
-
-
C:\Windows\Debug\cwshost.exeC:\Windows\Debug\cwshost.exe1⤵
- Executes dropped EXE
PID:1480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
473KB
MD524d447c2bbefaa8bac59f78b5373a494
SHA10fdda8d6a136aa8500eba235da54b5461e707693
SHA256e83ac7c30611d6e702fa5aac417b164371692990b22a09fcfa14914e43bc4b8c
SHA5128a93cfd0084880d755d38e6b062721c4fa2ec9d668ac2a407146b387f581886aec88181725e788f8243fd8e669622f74be475c2efca090be03a04d99bbb259eb
-
Filesize
473KB
MD524d447c2bbefaa8bac59f78b5373a494
SHA10fdda8d6a136aa8500eba235da54b5461e707693
SHA256e83ac7c30611d6e702fa5aac417b164371692990b22a09fcfa14914e43bc4b8c
SHA5128a93cfd0084880d755d38e6b062721c4fa2ec9d668ac2a407146b387f581886aec88181725e788f8243fd8e669622f74be475c2efca090be03a04d99bbb259eb