General
-
Target
NEAS.a8b3e6726e785ec919f469daca0085c0.exe
-
Size
1.2MB
-
Sample
231028-yqcmcahf6t
-
MD5
a8b3e6726e785ec919f469daca0085c0
-
SHA1
68350dc9e43da9ce79a97af58d5c51629d7f341d
-
SHA256
60f41fb93576acb95218dea7e0d71335aa6f1aed8747c580bbe67585e412040f
-
SHA512
f7262e2e3e38c7d352007f81ec7bceadc2fe2bc0e372eb373766848e40c144e53405fbc276fea8746ed1673e5bfb28726ec6a88a971bcb2480b7966378140751
-
SSDEEP
12288:KXgvmzFHi0mo5aH0qMzd5807F7dsPJQPDHvd:KXgvOHi0mGaH0qSdPF7dG4V
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.a8b3e6726e785ec919f469daca0085c0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.a8b3e6726e785ec919f469daca0085c0.exe
Resource
win10v2004-20231023-en
Malware Config
Targets
-
-
Target
NEAS.a8b3e6726e785ec919f469daca0085c0.exe
-
Size
1.2MB
-
MD5
a8b3e6726e785ec919f469daca0085c0
-
SHA1
68350dc9e43da9ce79a97af58d5c51629d7f341d
-
SHA256
60f41fb93576acb95218dea7e0d71335aa6f1aed8747c580bbe67585e412040f
-
SHA512
f7262e2e3e38c7d352007f81ec7bceadc2fe2bc0e372eb373766848e40c144e53405fbc276fea8746ed1673e5bfb28726ec6a88a971bcb2480b7966378140751
-
SSDEEP
12288:KXgvmzFHi0mo5aH0qMzd5807F7dsPJQPDHvd:KXgvOHi0mGaH0qSdPF7dG4V
Score10/10-
Modifies WinLogon for persistence
-
Adds policy Run key to start application
-
Disables RegEdit via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1