Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-11-2023 02:11

General

  • Target

    NEAS.edf59cbdfcb26b2208966568b8bd2200.exe

  • Size

    196KB

  • MD5

    edf59cbdfcb26b2208966568b8bd2200

  • SHA1

    6106a6cb6450aa2872b2097a2f096cca333fc955

  • SHA256

    e9c57113e7dd1d509e31a53c583e2e392fa9f17701dbe20b8d85f599ea6711a4

  • SHA512

    9be9d43e7c72ee60caea68a1c3cad84f89c2aa87b252aaa1c15c4a7db44c66bc8e9c11a9323becff5a918ef65d5b57072b56ad7c2ac44fdb375bb69d1e8996fb

  • SSDEEP

    1536:ur3Z5IfQmv81aZKyXXZPbihOjrqLy14Gp7FtnV7pjl:yJOfQm01KKyXXZPbi8aIp7nl

Score
8/10

Malware Config

Signatures

  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.edf59cbdfcb26b2208966568b8bd2200.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.edf59cbdfcb26b2208966568b8bd2200.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3844
    • C:\Windows\SysWOW64\attrib.exe
      attrib +a +s +h +r C:\Windows\Debug\cwshost.exe
      2⤵
      • Sets file to hidden
      • Drops file in Windows directory
      • Views/modifies file attributes
      PID:888
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\NEASED~1.EXE > nul
      2⤵
        PID:3836
    • C:\Windows\Debug\cwshost.exe
      C:\Windows\Debug\cwshost.exe
      1⤵
      • Executes dropped EXE
      PID:3688

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Debug\cwshost.exe

      Filesize

      196KB

      MD5

      8bb6ef126cc49c36522a9590de6d1569

      SHA1

      3fae1850bf57f8451b8ad495356d5bfe8ccbd73c

      SHA256

      11d6c5738d4e4353a905280faf54651d7e1bec6304aaecbfdc95b9994f271daa

      SHA512

      4551a2694f28e8b89e61a7c05d2fe074bb5d4d97baba685d1a648352af20d489bc0a4c9d1a603a78b710185a588c386efa1f9bb81e5b2eb49737cae71a11d962

    • C:\Windows\debug\cwshost.exe

      Filesize

      196KB

      MD5

      8bb6ef126cc49c36522a9590de6d1569

      SHA1

      3fae1850bf57f8451b8ad495356d5bfe8ccbd73c

      SHA256

      11d6c5738d4e4353a905280faf54651d7e1bec6304aaecbfdc95b9994f271daa

      SHA512

      4551a2694f28e8b89e61a7c05d2fe074bb5d4d97baba685d1a648352af20d489bc0a4c9d1a603a78b710185a588c386efa1f9bb81e5b2eb49737cae71a11d962