Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-10-2023 20:21

General

  • Target

    NEAS.e0fb0986bb22bda712638016ada0d360_JC.exe

  • Size

    5KB

  • MD5

    e0fb0986bb22bda712638016ada0d360

  • SHA1

    4a9017081d106a9533b38d039321416dba225f80

  • SHA256

    f8f866c255b2c2429f0d80f3a94b02e0ff6e808c53d2fa15aba117da3509dc50

  • SHA512

    e593bf78822a973d1ff1102b409edc102d9393f4f6971d0555092cda080d65fee5a2eb1ea6328bed4bf2ddf36b0fefbb296b673e03ac3f0494f8d6942d3c4fc6

  • SSDEEP

    48:q2s0ORAmnRt/G9PirTm6pq1rsHB/VnC/RAxUM2CS70ALNxVk8t8h:DJOqSXw9YquHnnwR2UM2ClAhxVk04

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.e0fb0986bb22bda712638016ada0d360_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.e0fb0986bb22bda712638016ada0d360_JC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4396
    • C:\Users\Admin\AppData\Local\Temp\huty.exe
      "C:\Users\Admin\AppData\Local\Temp\huty.exe"
      2⤵
      • Executes dropped EXE
      PID:3668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\huty.exe

    Filesize

    5KB

    MD5

    d2ee12d8c2acb23ce613f961574927c4

    SHA1

    abf785ff13bce7e0779372cdb6ed37a7b80bf249

    SHA256

    eeeb3d187c291f5137ce429bc1f6557beaff80512b6c6521f097fb5d6c1de8ac

    SHA512

    7e0a6cfea4c5b8cf1e895e49d358075af6ada1bd0282a1b7c545d8c9f16474f9c0b2ee1bbd75f05428a72c33273e63e9c4a34ac982414a3a407aad6c0ee01d60

  • C:\Users\Admin\AppData\Local\Temp\huty.exe

    Filesize

    5KB

    MD5

    d2ee12d8c2acb23ce613f961574927c4

    SHA1

    abf785ff13bce7e0779372cdb6ed37a7b80bf249

    SHA256

    eeeb3d187c291f5137ce429bc1f6557beaff80512b6c6521f097fb5d6c1de8ac

    SHA512

    7e0a6cfea4c5b8cf1e895e49d358075af6ada1bd0282a1b7c545d8c9f16474f9c0b2ee1bbd75f05428a72c33273e63e9c4a34ac982414a3a407aad6c0ee01d60

  • C:\Users\Admin\AppData\Local\Temp\huty.exe

    Filesize

    5KB

    MD5

    d2ee12d8c2acb23ce613f961574927c4

    SHA1

    abf785ff13bce7e0779372cdb6ed37a7b80bf249

    SHA256

    eeeb3d187c291f5137ce429bc1f6557beaff80512b6c6521f097fb5d6c1de8ac

    SHA512

    7e0a6cfea4c5b8cf1e895e49d358075af6ada1bd0282a1b7c545d8c9f16474f9c0b2ee1bbd75f05428a72c33273e63e9c4a34ac982414a3a407aad6c0ee01d60