Analysis
-
max time kernel
119s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2023 16:41
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.252a8365ee4753e15b119d859c4d8280.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.252a8365ee4753e15b119d859c4d8280.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.252a8365ee4753e15b119d859c4d8280.exe
-
Size
21KB
-
MD5
252a8365ee4753e15b119d859c4d8280
-
SHA1
820163539cec53b9d0030adcd4faa17900ae5fc3
-
SHA256
18fd43bdd0261b58c77fdf4d144d2715e604ee7a394a591eac28ed030aba4d97
-
SHA512
08ec0760eb99ec94f1f772dffdba5beae0ed52b7d11f89f03417d60855c73fdb6aaef81cbf48c9c9112890c3739176c3d0d38b94b5e48dc0820d28d068a8b043
-
SSDEEP
384:azg+XE+YkCkSbBUAch1A9NB/erdVvqwAli:mXE+YkCTqAs1FdE3i
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation NEAS.252a8365ee4753e15b119d859c4d8280.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation pdf_update.exe -
Executes dropped EXE 1 IoCs
pid Process 4928 pdf_update.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 408 wrote to memory of 4928 408 NEAS.252a8365ee4753e15b119d859c4d8280.exe 95 PID 408 wrote to memory of 4928 408 NEAS.252a8365ee4753e15b119d859c4d8280.exe 95 PID 408 wrote to memory of 4928 408 NEAS.252a8365ee4753e15b119d859c4d8280.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.252a8365ee4753e15b119d859c4d8280.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.252a8365ee4753e15b119d859c4d8280.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\pdf_update.exe"C:\Users\Admin\AppData\Local\Temp\pdf_update.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:4928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5011bf571134b37dc39eb0db2b681a440
SHA12c71f8201cb37f83722fee1bab2a2162c27a826b
SHA256da27bb1f6fe812ae97fba86f20faf4db4750a66596d485430462c1c66130d284
SHA5121fcbdbe9de9e6fa60f6ccd0a35a657910052724298f2ba449788927eb97bc2490b522ecabc15552b25de0eebecbff2b87f7244ee538db01ce2b724f4fe16d566
-
Filesize
21KB
MD5011bf571134b37dc39eb0db2b681a440
SHA12c71f8201cb37f83722fee1bab2a2162c27a826b
SHA256da27bb1f6fe812ae97fba86f20faf4db4750a66596d485430462c1c66130d284
SHA5121fcbdbe9de9e6fa60f6ccd0a35a657910052724298f2ba449788927eb97bc2490b522ecabc15552b25de0eebecbff2b87f7244ee538db01ce2b724f4fe16d566
-
Filesize
21KB
MD5011bf571134b37dc39eb0db2b681a440
SHA12c71f8201cb37f83722fee1bab2a2162c27a826b
SHA256da27bb1f6fe812ae97fba86f20faf4db4750a66596d485430462c1c66130d284
SHA5121fcbdbe9de9e6fa60f6ccd0a35a657910052724298f2ba449788927eb97bc2490b522ecabc15552b25de0eebecbff2b87f7244ee538db01ce2b724f4fe16d566