Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 08:58
Behavioral task
behavioral1
Sample
NEAS.c4c76e542d95076eb37ad071ca322d20.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.c4c76e542d95076eb37ad071ca322d20.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.c4c76e542d95076eb37ad071ca322d20.exe
-
Size
38KB
-
MD5
c4c76e542d95076eb37ad071ca322d20
-
SHA1
c40c501968d62ad1fed5281942951279ecdc39d1
-
SHA256
60f8137fedbe94d2516c795ba1ea9e8bc29d3cc9ea817c96f8461d9b9f7ef0f3
-
SHA512
649d488849ed939fc6a2779585c8b2e9537e1e998afd80331b1d619d00d85a57457a76d92214fa0da06fec58ea8c75a1c62880edf438ed95e7b3556dbc18c737
-
SSDEEP
768:gCkSsf4ssqtlrCE+51fiL8cNsiX8liiEKpDKb:gCkV0KlCpfqNse8li1db
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation NEAS.c4c76e542d95076eb37ad071ca322d20.exe -
Executes dropped EXE 1 IoCs
pid Process 3104 mtvhits.exe -
resource yara_rule behavioral2/memory/2584-0-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/files/0x0008000000022dfa-8.dat upx behavioral2/files/0x0008000000022dfa-11.dat upx behavioral2/files/0x0008000000022dfa-10.dat upx behavioral2/memory/2584-12-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3104-15-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2584 wrote to memory of 3104 2584 NEAS.c4c76e542d95076eb37ad071ca322d20.exe 90 PID 2584 wrote to memory of 3104 2584 NEAS.c4c76e542d95076eb37ad071ca322d20.exe 90 PID 2584 wrote to memory of 3104 2584 NEAS.c4c76e542d95076eb37ad071ca322d20.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.c4c76e542d95076eb37ad071ca322d20.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.c4c76e542d95076eb37ad071ca322d20.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\mtvhits.exe"C:\Users\Admin\AppData\Local\Temp\mtvhits.exe"2⤵
- Executes dropped EXE
PID:3104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD56a27a043e85d6e02014d679186940b2b
SHA16724e19c57289176f6a67b9fd6934ec0cbd41d21
SHA256b1b6cee94e113929d6e945a9f7cae5b4c73b461c9631f95f5439de053b8fa442
SHA5123b142348750bca6030dbe37e672724772589888c08ffc7c86497efac35a19604372cf6372cf1d345f4d951a244bc735e813ea870432d5e6fc3cd3c4851fb0c60
-
Filesize
38KB
MD56a27a043e85d6e02014d679186940b2b
SHA16724e19c57289176f6a67b9fd6934ec0cbd41d21
SHA256b1b6cee94e113929d6e945a9f7cae5b4c73b461c9631f95f5439de053b8fa442
SHA5123b142348750bca6030dbe37e672724772589888c08ffc7c86497efac35a19604372cf6372cf1d345f4d951a244bc735e813ea870432d5e6fc3cd3c4851fb0c60
-
Filesize
38KB
MD56a27a043e85d6e02014d679186940b2b
SHA16724e19c57289176f6a67b9fd6934ec0cbd41d21
SHA256b1b6cee94e113929d6e945a9f7cae5b4c73b461c9631f95f5439de053b8fa442
SHA5123b142348750bca6030dbe37e672724772589888c08ffc7c86497efac35a19604372cf6372cf1d345f4d951a244bc735e813ea870432d5e6fc3cd3c4851fb0c60