Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 08:54
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.72783d6933b7de3cf2d3fdf550be47c0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.72783d6933b7de3cf2d3fdf550be47c0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.72783d6933b7de3cf2d3fdf550be47c0.exe
-
Size
93KB
-
MD5
72783d6933b7de3cf2d3fdf550be47c0
-
SHA1
cf1690b513d3aeeb6681331197bca20704248f6e
-
SHA256
ee771e4758567e38bb34fd4daa12b5d6b81b0dade627f5eff8a9421951c788e3
-
SHA512
c26610eece5c35d1ff8ebf2d1afd2f87a4415b2dec9f15af1dd439a2ee4a48fd90e286e516ebdecdc72573779b5e8496f87b8cb562c3e11a6eabec56b6ad2127
-
SSDEEP
1536:PGYU/W2/HG6QMauSV3ixJHABLrmhH7i9CO+WHg7zRZICrWaGZh7ed:PfU/WF6QMauSuiWNi9CO+WARJrWNZ8d
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Control Panel\International\Geo\Nation NEAS.72783d6933b7de3cf2d3fdf550be47c0.exe -
Executes dropped EXE 1 IoCs
pid Process 4652 wuauclt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\wuauclt.exe\" /run" NEAS.72783d6933b7de3cf2d3fdf550be47c0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4084 wrote to memory of 4652 4084 NEAS.72783d6933b7de3cf2d3fdf550be47c0.exe 86 PID 4084 wrote to memory of 4652 4084 NEAS.72783d6933b7de3cf2d3fdf550be47c0.exe 86 PID 4084 wrote to memory of 4652 4084 NEAS.72783d6933b7de3cf2d3fdf550be47c0.exe 86 PID 4084 wrote to memory of 2476 4084 NEAS.72783d6933b7de3cf2d3fdf550be47c0.exe 100 PID 4084 wrote to memory of 2476 4084 NEAS.72783d6933b7de3cf2d3fdf550be47c0.exe 100 PID 4084 wrote to memory of 2476 4084 NEAS.72783d6933b7de3cf2d3fdf550be47c0.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.72783d6933b7de3cf2d3fdf550be47c0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.72783d6933b7de3cf2d3fdf550be47c0.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\ProgramData\Update\wuauclt.exe"C:\ProgramData\Update\wuauclt.exe" /run2⤵
- Executes dropped EXE
PID:4652
-
-
C:\windows\SysWOW64\cmd.exe"C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\NEAS.72783d6933b7de3cf2d3fdf550be47c0.exe" >> NUL2⤵PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD52a3d31ccb8f671c237f7eab6a745e172
SHA1efb6a166061cd014d2a8c9f50b88333a7f0dd968
SHA2566c77288c4d6e4286613d0247b73233bdfcb1db6cd55cb2d72f382652e8d69096
SHA512cf829b92f6a8af4b629b7bd057c536b70ecfd9bdd7ecf0fca1d2aa8a9919b346b2d9eef0072e9ec5780d895355c816e6a62932cc63ebf4da1a06e9a0471cae62
-
Filesize
93KB
MD52a3d31ccb8f671c237f7eab6a745e172
SHA1efb6a166061cd014d2a8c9f50b88333a7f0dd968
SHA2566c77288c4d6e4286613d0247b73233bdfcb1db6cd55cb2d72f382652e8d69096
SHA512cf829b92f6a8af4b629b7bd057c536b70ecfd9bdd7ecf0fca1d2aa8a9919b346b2d9eef0072e9ec5780d895355c816e6a62932cc63ebf4da1a06e9a0471cae62