Analysis
-
max time kernel
90s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 08:27
Behavioral task
behavioral1
Sample
NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe
Resource
win7-20231020-en
General
-
Target
NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe
-
Size
465KB
-
MD5
3837a2c234eba6152f5cfc9a5338ab73
-
SHA1
d843b155d39229809bdef898ae48190d6f108847
-
SHA256
8e620732f8541c584216d580057f165cbe982393eeed7c38d98fef2c335f2286
-
SHA512
fbcc057cf4d4ee16296546e00cebdce20ade0a5930c4d023c5ee2c96a5d0fb9a3ed256dc0827c19c50012919635465af2a8fa96d300cefb64275314e089f625b
-
SSDEEP
6144:k9H4y9VOpL/DeRRoSGFPRuDYBzFrY5dRA2AkCMnZi6c/2AS9kFwJARejm7C:kZF9VOpnqoSG1EcBhs9xAkLZMomC
Malware Config
Extracted
urelas
121.88.5.183
218.54.30.235
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe -
Executes dropped EXE 1 IoCs
pid Process 4028 sander.exe -
resource yara_rule behavioral2/memory/2216-0-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/files/0x0006000000022e05-6.dat upx behavioral2/files/0x0006000000022e05-8.dat upx behavioral2/files/0x0006000000022e05-9.dat upx behavioral2/memory/2216-13-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/4028-16-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/4028-17-0x0000000000400000-0x00000000004A9000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2216 wrote to memory of 4028 2216 NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe 90 PID 2216 wrote to memory of 4028 2216 NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe 90 PID 2216 wrote to memory of 4028 2216 NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe 90 PID 2216 wrote to memory of 1028 2216 NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe 91 PID 2216 wrote to memory of 1028 2216 NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe 91 PID 2216 wrote to memory of 1028 2216 NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\sander.exe"C:\Users\Admin\AppData\Local\Temp\sander.exe"2⤵
- Executes dropped EXE
PID:4028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_sannuyex.bat" "2⤵PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
287B
MD5c06d75b573f85b204d70a5203f20f65d
SHA1669035eaa6eed8808c0da743f4a91431071851d2
SHA256ec40eac232f7d3d7ff74dfa9202b55acdb3cd58d0883f4736a69229d76d30430
SHA512ff889f3e504d45e29763aef2c07ce4bf810b3e19eb451def62ff01e6fca9becab7ff2b09a551c45b9b843e3472f71f907c522e45220b4b46a1a2b269953e146a
-
Filesize
512B
MD5178eba193b631d7b0653896453b678b2
SHA18878cae8fb5417248da5800e4d85b00149160404
SHA2568c7800dfaf639b17e6b682b6fa2365275e6f80d07e6aa6bb56b676669d0e9db5
SHA512936f9ec171c7ad5aa63c6691d9ea109a3f1ef31fe00bc26fe5afa8ae0ee21b5d3f65e873a242e7986f98bcb9abc82911dbf34bb907ed7a4973e959b7e90c69d5
-
Filesize
465KB
MD5230a383b273eee6491875026ed2f72d2
SHA127a18cff7a2f8e6ac6b34262ed2ac16f0efa9e92
SHA2566baa81a16dcf1c45819afc7f182983da368a05f22b54b4db193acd1586ca381d
SHA5126d7e3392d0a15d8ff53ea9079edb67e9179ec6198b009be99b9fe6f4e1df1024e59cb0495cd2d000ef203060075f724cc670ac8239ec74b401ff3551a4628a1b
-
Filesize
465KB
MD5230a383b273eee6491875026ed2f72d2
SHA127a18cff7a2f8e6ac6b34262ed2ac16f0efa9e92
SHA2566baa81a16dcf1c45819afc7f182983da368a05f22b54b4db193acd1586ca381d
SHA5126d7e3392d0a15d8ff53ea9079edb67e9179ec6198b009be99b9fe6f4e1df1024e59cb0495cd2d000ef203060075f724cc670ac8239ec74b401ff3551a4628a1b
-
Filesize
465KB
MD5230a383b273eee6491875026ed2f72d2
SHA127a18cff7a2f8e6ac6b34262ed2ac16f0efa9e92
SHA2566baa81a16dcf1c45819afc7f182983da368a05f22b54b4db193acd1586ca381d
SHA5126d7e3392d0a15d8ff53ea9079edb67e9179ec6198b009be99b9fe6f4e1df1024e59cb0495cd2d000ef203060075f724cc670ac8239ec74b401ff3551a4628a1b