Analysis
-
max time kernel
162s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2023, 18:04
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.22614945f4651df80fcdea16355d9020.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.22614945f4651df80fcdea16355d9020.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.22614945f4651df80fcdea16355d9020.exe
-
Size
600KB
-
MD5
22614945f4651df80fcdea16355d9020
-
SHA1
111ee418779b105780aa1cbb178cc00310f83943
-
SHA256
644b663afe79a763e51bcb456028b6a97d9bac72fc34730d229fcbe5f5cb93e3
-
SHA512
6bc53f95146318c8b8debd471fe53bb24b58608bef72d2712bc70bea03d5f5736b78e56fef92b9576bb26fa458337370e5edfd4e6274291d3571e73f5073c41e
-
SSDEEP
6144:NptVO7mOV1u9MV0ue9Ya47I9Ya4oXtamAV3vQnx04EFtUXMamoa9tG6tP/q8f/Ps:NhEDfP/q8fmRYCKREDAc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation NEAS.22614945f4651df80fcdea16355d9020.exe -
Executes dropped EXE 1 IoCs
pid Process 3992 budha.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4060 wrote to memory of 3992 4060 NEAS.22614945f4651df80fcdea16355d9020.exe 93 PID 4060 wrote to memory of 3992 4060 NEAS.22614945f4651df80fcdea16355d9020.exe 93 PID 4060 wrote to memory of 3992 4060 NEAS.22614945f4651df80fcdea16355d9020.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.22614945f4651df80fcdea16355d9020.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.22614945f4651df80fcdea16355d9020.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:3992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600KB
MD58aab15288c39bc0e19c524251e2cf06d
SHA10e7c3ecef6df4568552dc81ec62931ae282e2c7c
SHA25660b52c810c995da16d60a9b99224da1b327d9800e50b05acf0f8186dbfa506ad
SHA512051cb02b40dd245a40b3b89c480052d4d824db75018b693fc4a2f77bc3c2ad8cdad2505a65eaa8b9f4b3428db26d8dc63ff72f28e7e21797a3ca70effc2c5638
-
Filesize
600KB
MD58aab15288c39bc0e19c524251e2cf06d
SHA10e7c3ecef6df4568552dc81ec62931ae282e2c7c
SHA25660b52c810c995da16d60a9b99224da1b327d9800e50b05acf0f8186dbfa506ad
SHA512051cb02b40dd245a40b3b89c480052d4d824db75018b693fc4a2f77bc3c2ad8cdad2505a65eaa8b9f4b3428db26d8dc63ff72f28e7e21797a3ca70effc2c5638
-
Filesize
600KB
MD58aab15288c39bc0e19c524251e2cf06d
SHA10e7c3ecef6df4568552dc81ec62931ae282e2c7c
SHA25660b52c810c995da16d60a9b99224da1b327d9800e50b05acf0f8186dbfa506ad
SHA512051cb02b40dd245a40b3b89c480052d4d824db75018b693fc4a2f77bc3c2ad8cdad2505a65eaa8b9f4b3428db26d8dc63ff72f28e7e21797a3ca70effc2c5638