Analysis

  • max time kernel
    139s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/11/2023, 11:39

General

  • Target

    NEAS.ec21211ed6f6d875b31cb13b97d64360_JC.exe

  • Size

    160KB

  • MD5

    ec21211ed6f6d875b31cb13b97d64360

  • SHA1

    f0cffb03e9c4e21ba96f871efbdc7e702d804e7d

  • SHA256

    d4d0042274ac1f03865992b02745fdf0cc7bff0029e91029f80a31ede2430147

  • SHA512

    93b4482eeef1c609dd788e912aad090d70178218c74641c2b7353cd735678335d7ed30908f47535e206b4466203730637b2e22c18c488836a52eece1a466b72e

  • SSDEEP

    3072:J3UG0Trxel16r6cLlFSEDfO/rdVb2C/tld2w056BqdPm6iDi:J3ZCImGMNfzYHd2YVG

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.ec21211ed6f6d875b31cb13b97d64360_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.ec21211ed6f6d875b31cb13b97d64360_JC.exe"
    1⤵
    • Checks computer location settings
    • Modifies WinLogon
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3304
    • C:\Users\Admin\AppData\Local\Temp\NEAS.ec21211ed6f6d875b31cb13b97d64360_JC.exe.exe
      "C:\Users\Admin\AppData\Local\Temp\NEAS.ec21211ed6f6d875b31cb13b97d64360_JC.exe.exe"
      2⤵
      • Executes dropped EXE
      PID:4516

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe.buf

          Filesize

          10.7MB

          MD5

          656be0fc6916366c0d5e03af88f025e3

          SHA1

          193a0730d9042c3827d4afd3e31eace4091a4112

          SHA256

          6ccc988b3667582266ec7bb7c0bbfd9568ec1ac376a9286b48a24668d8830b14

          SHA512

          be576ed03dd245ef11a7a40642f42217e7957208568f3207061a24d157307d136432fa35a7ce4dc5d7513e77e8168b6d01c84ca5b9e64946312b8d29993e0bc6

        • C:\Users\Admin\AppData\Local\Temp\NEAS.ec21211ed6f6d875b31cb13b97d64360_JC.exe.exe

          Filesize

          44KB

          MD5

          9da51802ff56a314ffcd1c6ad602dd2d

          SHA1

          65cdb63957a5749cef5b9c9a595ee5edb8a39d5c

          SHA256

          af5d91467dec9323c1511aa03c0a5d92cf6b191fd3355e3238993b5c5a62e161

          SHA512

          e4ccd183676f3eb37ee35e71f90e0e34d8e37613857ace1511a8eab0701becab34e9beb0b6c3a2c45f2a9a2f478d643f97d7101bf8ebc950175c26aadda4d636

        • C:\Users\Admin\AppData\Local\Temp\NEAS.ec21211ed6f6d875b31cb13b97d64360_JC.exe.exe

          Filesize

          44KB

          MD5

          9da51802ff56a314ffcd1c6ad602dd2d

          SHA1

          65cdb63957a5749cef5b9c9a595ee5edb8a39d5c

          SHA256

          af5d91467dec9323c1511aa03c0a5d92cf6b191fd3355e3238993b5c5a62e161

          SHA512

          e4ccd183676f3eb37ee35e71f90e0e34d8e37613857ace1511a8eab0701becab34e9beb0b6c3a2c45f2a9a2f478d643f97d7101bf8ebc950175c26aadda4d636

        • C:\Users\Admin\AppData\Local\Temp\NEAS.ec21211ed6f6d875b31cb13b97d64360_JC.exe.exe

          Filesize

          44KB

          MD5

          9da51802ff56a314ffcd1c6ad602dd2d

          SHA1

          65cdb63957a5749cef5b9c9a595ee5edb8a39d5c

          SHA256

          af5d91467dec9323c1511aa03c0a5d92cf6b191fd3355e3238993b5c5a62e161

          SHA512

          e4ccd183676f3eb37ee35e71f90e0e34d8e37613857ace1511a8eab0701becab34e9beb0b6c3a2c45f2a9a2f478d643f97d7101bf8ebc950175c26aadda4d636

        • memory/3304-37-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/3304-36-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/3304-64-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/3304-83-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/3304-124-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/4516-18-0x0000000000BC0000-0x0000000000BCE000-memory.dmp

          Filesize

          56KB

        • memory/4516-25-0x0000000005990000-0x0000000005EBC000-memory.dmp

          Filesize

          5.2MB

        • memory/4516-33-0x0000000073580000-0x0000000073D30000-memory.dmp

          Filesize

          7.7MB

        • memory/4516-17-0x0000000073580000-0x0000000073D30000-memory.dmp

          Filesize

          7.7MB