Analysis
-
max time kernel
180s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2023, 21:12
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe
-
Size
257KB
-
MD5
f8c431385b26359e8a88ae72b0812650
-
SHA1
a6a2aae10c4c5dc8572b2657bfa167c158f927f0
-
SHA256
8ae56fd12244d0c8403a76405f898afc276e0e4ebcbc3bfce7e9994f2bbcc2ff
-
SHA512
eff6fda763f2adad93329cddd92ca01222f195f10f73d09f5fd3459655646372219580ee266b5d8b790ea25ab8a5dd9045ef619cff36d9b3c600b5942e6c61fe
-
SSDEEP
6144:Lottw6sbF2RaA1B+BwXj+G0ZRGP1dJiGNmOdT2GusIKpvVAOv/5T3Eoj7FAqibO/:cRsbFaL1BDpZj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe -
Executes dropped EXE 3 IoCs
pid Process 1780 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 768 datafli.exe 2708 datafli.exe -
resource yara_rule behavioral2/memory/1780-7-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1780-12-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1780-14-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1780-43-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1780-65-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2708-67-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Key Name = "C:\\Users\\Admin\\AppData\\Roaming\\FolderName\\datafli.exe" reg.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 4596 set thread context of 2172 4596 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 99 PID 4596 set thread context of 1780 4596 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 100 PID 768 set thread context of 2604 768 datafli.exe 111 PID 768 set thread context of 2708 768 datafli.exe 112 PID 768 set thread context of 0 768 datafli.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2172 svchost.exe 2604 svchost.exe 2604 svchost.exe 2604 svchost.exe 2604 svchost.exe 2604 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe Token: SeDebugPrivilege 2708 datafli.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4596 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 2172 svchost.exe 1780 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 768 datafli.exe 2604 svchost.exe 2708 datafli.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 4596 wrote to memory of 2172 4596 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 99 PID 4596 wrote to memory of 2172 4596 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 99 PID 4596 wrote to memory of 2172 4596 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 99 PID 4596 wrote to memory of 2172 4596 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 99 PID 4596 wrote to memory of 2172 4596 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 99 PID 4596 wrote to memory of 2172 4596 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 99 PID 4596 wrote to memory of 2172 4596 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 99 PID 4596 wrote to memory of 2172 4596 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 99 PID 4596 wrote to memory of 2172 4596 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 99 PID 4596 wrote to memory of 1780 4596 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 100 PID 4596 wrote to memory of 1780 4596 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 100 PID 4596 wrote to memory of 1780 4596 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 100 PID 4596 wrote to memory of 1780 4596 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 100 PID 4596 wrote to memory of 1780 4596 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 100 PID 4596 wrote to memory of 1780 4596 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 100 PID 4596 wrote to memory of 1780 4596 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 100 PID 4596 wrote to memory of 1780 4596 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 100 PID 1780 wrote to memory of 4788 1780 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 101 PID 1780 wrote to memory of 4788 1780 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 101 PID 1780 wrote to memory of 4788 1780 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 101 PID 4788 wrote to memory of 4992 4788 cmd.exe 104 PID 4788 wrote to memory of 4992 4788 cmd.exe 104 PID 4788 wrote to memory of 4992 4788 cmd.exe 104 PID 1780 wrote to memory of 768 1780 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 105 PID 1780 wrote to memory of 768 1780 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 105 PID 1780 wrote to memory of 768 1780 NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe 105 PID 768 wrote to memory of 2604 768 datafli.exe 111 PID 768 wrote to memory of 2604 768 datafli.exe 111 PID 768 wrote to memory of 2604 768 datafli.exe 111 PID 768 wrote to memory of 2604 768 datafli.exe 111 PID 768 wrote to memory of 2604 768 datafli.exe 111 PID 768 wrote to memory of 2604 768 datafli.exe 111 PID 768 wrote to memory of 2604 768 datafli.exe 111 PID 768 wrote to memory of 2604 768 datafli.exe 111 PID 768 wrote to memory of 2604 768 datafli.exe 111 PID 768 wrote to memory of 2708 768 datafli.exe 112 PID 768 wrote to memory of 2708 768 datafli.exe 112 PID 768 wrote to memory of 2708 768 datafli.exe 112 PID 768 wrote to memory of 2708 768 datafli.exe 112 PID 768 wrote to memory of 2708 768 datafli.exe 112 PID 768 wrote to memory of 2708 768 datafli.exe 112 PID 768 wrote to memory of 2708 768 datafli.exe 112 PID 768 wrote to memory of 2708 768 datafli.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2172
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f8c431385b26359e8a88ae72b0812650_JC.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YMYJI.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Key Name" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe" /f4⤵
- Adds Run key to start application
PID:4992
-
-
-
C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe"C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2604
-
-
C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe"C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2708
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257KB
MD5f8c431385b26359e8a88ae72b0812650
SHA1a6a2aae10c4c5dc8572b2657bfa167c158f927f0
SHA2568ae56fd12244d0c8403a76405f898afc276e0e4ebcbc3bfce7e9994f2bbcc2ff
SHA512eff6fda763f2adad93329cddd92ca01222f195f10f73d09f5fd3459655646372219580ee266b5d8b790ea25ab8a5dd9045ef619cff36d9b3c600b5942e6c61fe
-
Filesize
148B
MD5cad4294c9f78a2359f70ea09f0f56325
SHA11d02ee76821a5b6fe45aa4f12bac8f86b0043691
SHA25648eb38071c5a2a5c40b3110fcbcb52f6ad0849c3ec20b1cf1be5fa223ac0aaf4
SHA512cd62dd9423a3224d2c4d27853554e0574212cf48a824d562ab3e17231bb839f1dadb12067a7ca39c0cf8ddd5b0e3e8c1dbf601f9822567957e7c29e51fe1693d
-
Filesize
148B
MD5cad4294c9f78a2359f70ea09f0f56325
SHA11d02ee76821a5b6fe45aa4f12bac8f86b0043691
SHA25648eb38071c5a2a5c40b3110fcbcb52f6ad0849c3ec20b1cf1be5fa223ac0aaf4
SHA512cd62dd9423a3224d2c4d27853554e0574212cf48a824d562ab3e17231bb839f1dadb12067a7ca39c0cf8ddd5b0e3e8c1dbf601f9822567957e7c29e51fe1693d
-
Filesize
257KB
MD53a2b281236b945a82ec56894266a5c2d
SHA17d34c52920010a35752be85c27d3793a3c8af5cb
SHA256a62728b2332b6234954067950754235b6dd5df50e36fa67693f67850a7dd8573
SHA51284d14046083409fa56e78ac6609d3edf09b8e768c32622dc7b6924f7af799731d27e062b595c73c6f3a5c0270308ebcc17236a531751a075430b05f11bf9b105
-
Filesize
257KB
MD53a2b281236b945a82ec56894266a5c2d
SHA17d34c52920010a35752be85c27d3793a3c8af5cb
SHA256a62728b2332b6234954067950754235b6dd5df50e36fa67693f67850a7dd8573
SHA51284d14046083409fa56e78ac6609d3edf09b8e768c32622dc7b6924f7af799731d27e062b595c73c6f3a5c0270308ebcc17236a531751a075430b05f11bf9b105
-
Filesize
257KB
MD53a2b281236b945a82ec56894266a5c2d
SHA17d34c52920010a35752be85c27d3793a3c8af5cb
SHA256a62728b2332b6234954067950754235b6dd5df50e36fa67693f67850a7dd8573
SHA51284d14046083409fa56e78ac6609d3edf09b8e768c32622dc7b6924f7af799731d27e062b595c73c6f3a5c0270308ebcc17236a531751a075430b05f11bf9b105
-
Filesize
257KB
MD53a2b281236b945a82ec56894266a5c2d
SHA17d34c52920010a35752be85c27d3793a3c8af5cb
SHA256a62728b2332b6234954067950754235b6dd5df50e36fa67693f67850a7dd8573
SHA51284d14046083409fa56e78ac6609d3edf09b8e768c32622dc7b6924f7af799731d27e062b595c73c6f3a5c0270308ebcc17236a531751a075430b05f11bf9b105