Analysis
-
max time kernel
147s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2023 16:45
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.83902dca3601d728b3ad45f05d279400.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.83902dca3601d728b3ad45f05d279400.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.83902dca3601d728b3ad45f05d279400.exe
-
Size
28KB
-
MD5
83902dca3601d728b3ad45f05d279400
-
SHA1
33ec0ce3457c0326d86516272771e3f95b8d92c2
-
SHA256
40304c88f7235b440a11e1b01b6e33b9a0abffc2357c5a0662f1284090df09c2
-
SHA512
c661e0e9dbdddae6c8ab8457dcfec2e41c67b8e3edc87416e27ef37e7bd80a035309a7f7355ef9e580f3c330b6c055d8c568cd2e14776fbecc76d70e533864f5
-
SSDEEP
384:UzITvSruyioUHFMvezAls1oKCIFVbLOh1foJHe8stdV:UMTx4USGzAlsyKCIFIh1fUstv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation NEAS.83902dca3601d728b3ad45f05d279400.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation kgfdfjdk.exe -
Executes dropped EXE 1 IoCs
pid Process 3672 kgfdfjdk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 396 wrote to memory of 3672 396 NEAS.83902dca3601d728b3ad45f05d279400.exe 94 PID 396 wrote to memory of 3672 396 NEAS.83902dca3601d728b3ad45f05d279400.exe 94 PID 396 wrote to memory of 3672 396 NEAS.83902dca3601d728b3ad45f05d279400.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.83902dca3601d728b3ad45f05d279400.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.83902dca3601d728b3ad45f05d279400.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\kgfdfjdk.exe"C:\Users\Admin\AppData\Local\Temp\kgfdfjdk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5b593a1dd1aeaa687e3f4f3688f65a6ad
SHA1a8f870a1ba77f05a1ec9a227d9a190b7c187f5a7
SHA2569cb495a3bbb11efa57a6213faf53726797e161d3160e7af8d9deb34b95ffae02
SHA5126a1872080511fdde636c9d80c4d90a9f9d23726352f17216426adce25057e6839624e34d082395b3fdad671a2ad6294f0cdcce48280aaca1975342f9c3266a4e
-
Filesize
29KB
MD5b593a1dd1aeaa687e3f4f3688f65a6ad
SHA1a8f870a1ba77f05a1ec9a227d9a190b7c187f5a7
SHA2569cb495a3bbb11efa57a6213faf53726797e161d3160e7af8d9deb34b95ffae02
SHA5126a1872080511fdde636c9d80c4d90a9f9d23726352f17216426adce25057e6839624e34d082395b3fdad671a2ad6294f0cdcce48280aaca1975342f9c3266a4e
-
Filesize
29KB
MD5b593a1dd1aeaa687e3f4f3688f65a6ad
SHA1a8f870a1ba77f05a1ec9a227d9a190b7c187f5a7
SHA2569cb495a3bbb11efa57a6213faf53726797e161d3160e7af8d9deb34b95ffae02
SHA5126a1872080511fdde636c9d80c4d90a9f9d23726352f17216426adce25057e6839624e34d082395b3fdad671a2ad6294f0cdcce48280aaca1975342f9c3266a4e