Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2023 04:35
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.24b3d4a4f75fafb99707afd13b4b4cb0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.24b3d4a4f75fafb99707afd13b4b4cb0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.24b3d4a4f75fafb99707afd13b4b4cb0.exe
-
Size
44KB
-
MD5
24b3d4a4f75fafb99707afd13b4b4cb0
-
SHA1
1dfaab602b34520351c848d721e52de730b0980d
-
SHA256
68a91e9901a3e09f15795b7f03415ab09bb107c8c2b4ef271912dee2bf418416
-
SHA512
bd2710ede7a37e9db86de8d4aec9a9d6ac1228ee9483fd9d607af95796765a9c421e7c7eca2c141307e8da6281225a9b54c7f86f3a917728f66e0b64f5d90c0a
-
SSDEEP
768:hAvJ4LSyC8aVN7yycRbelpE1uE9xiMQVI9e:2B4OyC8aVN7+elmZEIQ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation NEAS.24b3d4a4f75fafb99707afd13b4b4cb0.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation comhost.exe -
Executes dropped EXE 1 IoCs
pid Process 3024 comhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4488 wrote to memory of 3024 4488 NEAS.24b3d4a4f75fafb99707afd13b4b4cb0.exe 91 PID 4488 wrote to memory of 3024 4488 NEAS.24b3d4a4f75fafb99707afd13b4b4cb0.exe 91 PID 4488 wrote to memory of 3024 4488 NEAS.24b3d4a4f75fafb99707afd13b4b4cb0.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.24b3d4a4f75fafb99707afd13b4b4cb0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.24b3d4a4f75fafb99707afd13b4b4cb0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\comhost.exe"C:\Users\Admin\AppData\Local\Temp\comhost.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5e1156fa83905550eeb9aaec2b958d22b
SHA15f736bbfffbbe12335037dc6e86ff47e303cd6d8
SHA2561fe1e24c525f5fa60fb3f04a2db016916a69f5b94a5feaedcb72769f6dfa38b1
SHA512a6969016283d2c1bd6df9a26ecd06a6ceaa92a9c46a34b492ca913e350948b42cc2f64d3998bd572b62d7976fde07645b538eafbd13a964ca293e91701b6e284
-
Filesize
44KB
MD5e1156fa83905550eeb9aaec2b958d22b
SHA15f736bbfffbbe12335037dc6e86ff47e303cd6d8
SHA2561fe1e24c525f5fa60fb3f04a2db016916a69f5b94a5feaedcb72769f6dfa38b1
SHA512a6969016283d2c1bd6df9a26ecd06a6ceaa92a9c46a34b492ca913e350948b42cc2f64d3998bd572b62d7976fde07645b538eafbd13a964ca293e91701b6e284
-
Filesize
44KB
MD5e1156fa83905550eeb9aaec2b958d22b
SHA15f736bbfffbbe12335037dc6e86ff47e303cd6d8
SHA2561fe1e24c525f5fa60fb3f04a2db016916a69f5b94a5feaedcb72769f6dfa38b1
SHA512a6969016283d2c1bd6df9a26ecd06a6ceaa92a9c46a34b492ca913e350948b42cc2f64d3998bd572b62d7976fde07645b538eafbd13a964ca293e91701b6e284
-
Filesize
18KB
MD582ed3dc33cd71025510a05b664eb558b
SHA1fb1523ae7fa073a173afac08df9eaf3340fa962b
SHA256f088b073091ffca7ca0063658e01021738be4665c4407ba475a8b9774e1b1ccb
SHA5123edb2cde8d1477bec536361c9a931050b03348dd49284d443df34efb2fb62260cfaffe8a47fa20f05c7fde014b60be3ebeb2b533957ed215ba458655a81633a7