Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/11/2023, 16:44

General

  • Target

    NEAS.6c0fadc9ec46bdf0ab9ec275aac33300.exe

  • Size

    124KB

  • MD5

    6c0fadc9ec46bdf0ab9ec275aac33300

  • SHA1

    f32117ea054a7bb5759f668ecb21a60e457ffe5d

  • SHA256

    960800ecb310686d911d791a858cd9c6129f4a850bd64d2ad956adeb54943996

  • SHA512

    9d93cd872891de4aa7a3aa5f558609e8a06c87ce8e7b89daebf728473e14370df0f617fec07b634e5e03d26617c8f282828aff6611ace9ec59f7fb02a07778aa

  • SSDEEP

    1536:5j9QfZhvgM/AQmSNFONMlszAjUk3nrKNvvDNTXrtG1NcJ:v4Xgf1AnrKN3DNTRPJ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.6c0fadc9ec46bdf0ab9ec275aac33300.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.6c0fadc9ec46bdf0ab9ec275aac33300.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3704
    • C:\Users\Admin\teayoew.exe
      "C:\Users\Admin\teayoew.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5052

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\teayoew.exe

          Filesize

          124KB

          MD5

          6ea5e75a3ac15e68f8e1d787502600a2

          SHA1

          152d50e9957fbfec3b7de629c390383a9de9ad3b

          SHA256

          7f64f3c9a2837acf381348aba2790bb48fd79412f0cbd4eec26dcd309f42225c

          SHA512

          137d606b17404f1c9300ff0950e81bf3e14ed7df31a67d36776a4c06cbb9159b9bf88d72dbfba5f6e359fc4f6b5f3d706c01156621b98bb09ab4347159dd72f7

        • C:\Users\Admin\teayoew.exe

          Filesize

          124KB

          MD5

          6ea5e75a3ac15e68f8e1d787502600a2

          SHA1

          152d50e9957fbfec3b7de629c390383a9de9ad3b

          SHA256

          7f64f3c9a2837acf381348aba2790bb48fd79412f0cbd4eec26dcd309f42225c

          SHA512

          137d606b17404f1c9300ff0950e81bf3e14ed7df31a67d36776a4c06cbb9159b9bf88d72dbfba5f6e359fc4f6b5f3d706c01156621b98bb09ab4347159dd72f7

        • C:\Users\Admin\teayoew.exe

          Filesize

          124KB

          MD5

          6ea5e75a3ac15e68f8e1d787502600a2

          SHA1

          152d50e9957fbfec3b7de629c390383a9de9ad3b

          SHA256

          7f64f3c9a2837acf381348aba2790bb48fd79412f0cbd4eec26dcd309f42225c

          SHA512

          137d606b17404f1c9300ff0950e81bf3e14ed7df31a67d36776a4c06cbb9159b9bf88d72dbfba5f6e359fc4f6b5f3d706c01156621b98bb09ab4347159dd72f7

        • memory/3704-0-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/3704-25-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/5052-22-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/5052-26-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB