Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2023 08:56
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.e279f4db9a67da5a8a8236db2fd54aa0_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.e279f4db9a67da5a8a8236db2fd54aa0_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.e279f4db9a67da5a8a8236db2fd54aa0_JC.exe
-
Size
396KB
-
MD5
e279f4db9a67da5a8a8236db2fd54aa0
-
SHA1
4ba2adddadf8534ec714feec6210f0f5449fcba2
-
SHA256
3b591aee9fb7e8e089f69cc8fe198df85e4e544cca580ec1d8850719b4cdff59
-
SHA512
bfc6411fda5f956bf54785ca97bfa98f19a5c7d73fdc08071155bb171478a089e4a79118bdae343305560703dd883039c445b1cc3a5e0b79f63b1d439dc7386b
-
SSDEEP
6144:yXIp3oRtL6q0SNyRSFKYyNU9t0JT8vKArIydVuw3GX1pv7DaPe+1qOWGMcQ1fXRj:y4StL68NWYKYyNUmAv7b4aPb4OWHcQ2
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" guudeg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation NEAS.e279f4db9a67da5a8a8236db2fd54aa0_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 1192 guudeg.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /U" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /M" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /N" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /A" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /o" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /K" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /F" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /f" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /H" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /h" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /a" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /D" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /T" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /s" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /t" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /c" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /m" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /I" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /R" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /w" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /i" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /Y" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /E" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /J" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /k" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /y" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /u" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /S" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /g" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /b" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /x" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /j" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /l" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /v" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /q" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /P" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /G" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /V" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /C" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /n" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /d" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /e" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /z" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /L" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /B" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /p" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /r" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /O" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /Z" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /X" guudeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guudeg = "C:\\Users\\Admin\\guudeg.exe /W" guudeg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe 1192 guudeg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4104 NEAS.e279f4db9a67da5a8a8236db2fd54aa0_JC.exe 1192 guudeg.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4104 wrote to memory of 1192 4104 NEAS.e279f4db9a67da5a8a8236db2fd54aa0_JC.exe 95 PID 4104 wrote to memory of 1192 4104 NEAS.e279f4db9a67da5a8a8236db2fd54aa0_JC.exe 95 PID 4104 wrote to memory of 1192 4104 NEAS.e279f4db9a67da5a8a8236db2fd54aa0_JC.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.e279f4db9a67da5a8a8236db2fd54aa0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e279f4db9a67da5a8a8236db2fd54aa0_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\guudeg.exe"C:\Users\Admin\guudeg.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD544517a20ae8c6a7014fa63ad3297b549
SHA11bdcfeccb543bdff4fb62a1cee2b747523b96693
SHA256056b6ba9a6c81022b829b448de5c86534e80ad5cca8181156662143bf7446216
SHA5125434b5b1d66ee0d4dcf9442f7793ee7d16c849574279ee17b31f59329a0d039a075c4fd33eb0e0fe850aa8da82856ab2abcd64264970c238fdc634e63708cd55
-
Filesize
396KB
MD544517a20ae8c6a7014fa63ad3297b549
SHA11bdcfeccb543bdff4fb62a1cee2b747523b96693
SHA256056b6ba9a6c81022b829b448de5c86534e80ad5cca8181156662143bf7446216
SHA5125434b5b1d66ee0d4dcf9442f7793ee7d16c849574279ee17b31f59329a0d039a075c4fd33eb0e0fe850aa8da82856ab2abcd64264970c238fdc634e63708cd55
-
Filesize
396KB
MD544517a20ae8c6a7014fa63ad3297b549
SHA11bdcfeccb543bdff4fb62a1cee2b747523b96693
SHA256056b6ba9a6c81022b829b448de5c86534e80ad5cca8181156662143bf7446216
SHA5125434b5b1d66ee0d4dcf9442f7793ee7d16c849574279ee17b31f59329a0d039a075c4fd33eb0e0fe850aa8da82856ab2abcd64264970c238fdc634e63708cd55