Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2023 18:03
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.1a6a88efc25bc3f2576656379dfc2690.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.1a6a88efc25bc3f2576656379dfc2690.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.1a6a88efc25bc3f2576656379dfc2690.exe
-
Size
67KB
-
MD5
1a6a88efc25bc3f2576656379dfc2690
-
SHA1
7d5476d33ea734a662c920f3522f214e45aeab11
-
SHA256
58040296fa20f62f56a9bb7f5b643205c9618f9249d4815113c18144b1300645
-
SHA512
6b22346ba4f521cdc886ba8eb07e65446d521a059a4e304d8aaa0be6536b36e8611e46eea9f60620c77ea53de3b5bb2c7be62178b57f6928aebf9d7105551d21
-
SSDEEP
768:OrItKyw5WHXfQmjIiIk9ecAakMb96ZyXuDLdibfffbPPP4:Or3Z5IfQmv81abyyXcZibfffc
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4252 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation NEAS.1a6a88efc25bc3f2576656379dfc2690.exe -
Executes dropped EXE 1 IoCs
pid Process 1008 nkmhost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\nkmhost.exe NEAS.1a6a88efc25bc3f2576656379dfc2690.exe File opened for modification C:\Windows\Debug\nkmhost.exe NEAS.1a6a88efc25bc3f2576656379dfc2690.exe File opened for modification C:\Windows\Debug\nkmhost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 684 NEAS.1a6a88efc25bc3f2576656379dfc2690.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 684 wrote to memory of 4252 684 NEAS.1a6a88efc25bc3f2576656379dfc2690.exe 90 PID 684 wrote to memory of 4252 684 NEAS.1a6a88efc25bc3f2576656379dfc2690.exe 90 PID 684 wrote to memory of 4252 684 NEAS.1a6a88efc25bc3f2576656379dfc2690.exe 90 PID 684 wrote to memory of 3528 684 NEAS.1a6a88efc25bc3f2576656379dfc2690.exe 93 PID 684 wrote to memory of 3528 684 NEAS.1a6a88efc25bc3f2576656379dfc2690.exe 93 PID 684 wrote to memory of 3528 684 NEAS.1a6a88efc25bc3f2576656379dfc2690.exe 93 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4252 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.1a6a88efc25bc3f2576656379dfc2690.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.1a6a88efc25bc3f2576656379dfc2690.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\nkmhost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:4252
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\NEAS1A~1.EXE > nul2⤵PID:3528
-
-
C:\Windows\Debug\nkmhost.exeC:\Windows\Debug\nkmhost.exe1⤵
- Executes dropped EXE
PID:1008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5e688075438319fa440f2ec52f3920174
SHA17891728c5580ba9dbd100c7bf90b9c0dcbf87d08
SHA25679375c9bd7890d95dc484b1007ac825a0378752b77ac48903776ae83a4d52128
SHA5120e653cc28803e929f7df61c6525be6c4a238f75fdffb73ff337062452f5c9462616f14f3fe1e48b3f592580d31c9deca029419b6f0775a629e449219e2df2f2f
-
Filesize
67KB
MD5e688075438319fa440f2ec52f3920174
SHA17891728c5580ba9dbd100c7bf90b9c0dcbf87d08
SHA25679375c9bd7890d95dc484b1007ac825a0378752b77ac48903776ae83a4d52128
SHA5120e653cc28803e929f7df61c6525be6c4a238f75fdffb73ff337062452f5c9462616f14f3fe1e48b3f592580d31c9deca029419b6f0775a629e449219e2df2f2f