Analysis
-
max time kernel
137s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2023 16:44
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.78f356ee098ffc38cbaf4f3c22a29530.exe
Resource
win7-20231025-en
General
-
Target
NEAS.78f356ee098ffc38cbaf4f3c22a29530.exe
-
Size
58KB
-
MD5
78f356ee098ffc38cbaf4f3c22a29530
-
SHA1
9f824214c8e97716790822deaa77a91bd3f5f406
-
SHA256
6706ce52c6513f9b66c67d199e835f72195fef53bc87a4f20190aca45052363f
-
SHA512
a5c46cf871b10755c891459ad9a1945a107d0b1e9b4e41f531e3017d5eedadec3f72e94a4debc21cf15c5d1a16a2d567c728e84364dccbc72f4d84334f7016b2
-
SSDEEP
768:6b4zb59Yix/RoyH+5flZirYqc97vFvrpaZG3DHvTdA9GgnOuS5ZFYycKZpFZx5EF:6bQx5oPsr2vFxDPhAvzgAQzFZ77Mp
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation NEAS.78f356ee098ffc38cbaf4f3c22a29530.exe -
Executes dropped EXE 1 IoCs
pid Process 1320 biudfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2764 wrote to memory of 1320 2764 NEAS.78f356ee098ffc38cbaf4f3c22a29530.exe 93 PID 2764 wrote to memory of 1320 2764 NEAS.78f356ee098ffc38cbaf4f3c22a29530.exe 93 PID 2764 wrote to memory of 1320 2764 NEAS.78f356ee098ffc38cbaf4f3c22a29530.exe 93 PID 2764 wrote to memory of 2840 2764 NEAS.78f356ee098ffc38cbaf4f3c22a29530.exe 94 PID 2764 wrote to memory of 2840 2764 NEAS.78f356ee098ffc38cbaf4f3c22a29530.exe 94 PID 2764 wrote to memory of 2840 2764 NEAS.78f356ee098ffc38cbaf4f3c22a29530.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.78f356ee098ffc38cbaf4f3c22a29530.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.78f356ee098ffc38cbaf4f3c22a29530.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
PID:1320
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5e2d4bb51e31e800ca552af99b1d46982
SHA16f3cb0adbcb6ce6c64335311413e22480ec23ae2
SHA256af89e6895b494783aa0f5ae4eecc7f872886987743f5346fd7cd6a8ff29cba41
SHA512daefa58a1c59fe19380cb7e700cf1ed6359987d31fa25ce60fba515698f052f14005d4c43e9bd5f3500c06af4fcb1baa46969306d38701780b78c131332f89d5
-
Filesize
58KB
MD5e2d4bb51e31e800ca552af99b1d46982
SHA16f3cb0adbcb6ce6c64335311413e22480ec23ae2
SHA256af89e6895b494783aa0f5ae4eecc7f872886987743f5346fd7cd6a8ff29cba41
SHA512daefa58a1c59fe19380cb7e700cf1ed6359987d31fa25ce60fba515698f052f14005d4c43e9bd5f3500c06af4fcb1baa46969306d38701780b78c131332f89d5
-
Filesize
58KB
MD5e2d4bb51e31e800ca552af99b1d46982
SHA16f3cb0adbcb6ce6c64335311413e22480ec23ae2
SHA256af89e6895b494783aa0f5ae4eecc7f872886987743f5346fd7cd6a8ff29cba41
SHA512daefa58a1c59fe19380cb7e700cf1ed6359987d31fa25ce60fba515698f052f14005d4c43e9bd5f3500c06af4fcb1baa46969306d38701780b78c131332f89d5
-
Filesize
512B
MD5efd90b3ac908d5482af367de3a82184a
SHA1de9f01d2ed0247b7b347e55c5a09721a60147fb9
SHA25644f3db1bb73bb207a88008ae28d0399f888b5714ccccb2056f4148b4455e693d
SHA5126e3355f895af1d81887d5750033c5a139e4a0e1c2c928aeef1fd37f9c191e754b1f524d252c229ea5e744dbef4dd0a8240d9d3443651d42de198e82a197afb02
-
Filesize
284B
MD544ac0ada6c52dbdb7cfd9c1cd95ef0a7
SHA1f90e0f5159ea7790047b1057da34b98d7f206b8c
SHA256514022eebeddfd6fc3c3742d0aa7f7fe72e23188a5ef4206a59100cbe8bf0573
SHA512f8f5a6e2733ca792b8fd08ea04c49b06cedcbc489a6940203c84eb8b104ee5c6e5b23618a085f7835fd071cc07d700533799ac0bd49da78d7eb5b9a67bf3095b