Analysis
-
max time kernel
89s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2023, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0eb742b08505fb81f676b46a82a5dfd0_JC.exe
Resource
win7-20231020-en
General
-
Target
NEAS.0eb742b08505fb81f676b46a82a5dfd0_JC.exe
-
Size
78KB
-
MD5
0eb742b08505fb81f676b46a82a5dfd0
-
SHA1
92458c36ed1aafcd9378341d5ebbe22e7395959c
-
SHA256
9068630b263e18236df12d3b495e807072e84e703dcd47500723f02177e47b67
-
SHA512
4b924ff0323cdd928acdbdf8611a4dba0612908ff26d073a757a532ecb3e866dea74bf819dd847e7222e76b44b53b55e74206140c85219cae8798cf1444f1318
-
SSDEEP
1536:zxKyhnAUfUiZR9G84qk+Be/HZ17hmZp2P:zLCEZTGx5180
Malware Config
Extracted
urelas
218.54.28.139
121.88.5.183
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Control Panel\International\Geo\Nation NEAS.0eb742b08505fb81f676b46a82a5dfd0_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 1272 poldge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2448 wrote to memory of 1272 2448 NEAS.0eb742b08505fb81f676b46a82a5dfd0_JC.exe 90 PID 2448 wrote to memory of 1272 2448 NEAS.0eb742b08505fb81f676b46a82a5dfd0_JC.exe 90 PID 2448 wrote to memory of 1272 2448 NEAS.0eb742b08505fb81f676b46a82a5dfd0_JC.exe 90 PID 2448 wrote to memory of 4020 2448 NEAS.0eb742b08505fb81f676b46a82a5dfd0_JC.exe 91 PID 2448 wrote to memory of 4020 2448 NEAS.0eb742b08505fb81f676b46a82a5dfd0_JC.exe 91 PID 2448 wrote to memory of 4020 2448 NEAS.0eb742b08505fb81f676b46a82a5dfd0_JC.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.0eb742b08505fb81f676b46a82a5dfd0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.0eb742b08505fb81f676b46a82a5dfd0_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\poldge.exe"C:\Users\Admin\AppData\Local\Temp\poldge.exe"2⤵
- Executes dropped EXE
PID:1272
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵PID:4020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD5af6f90fee60d60070d9076eba7533c76
SHA1015da84cb0cfce8699e8b1937dfac54a15e7e792
SHA25614360d90f621ef9e1d84b269de67f782c9f6a904cf3226c2724d4898c157b687
SHA51253ce60ef6f9dc9241d106d4e160833430e7855a221babf9835578096313a7a8ba1285df8d5620850ffe9f41f860e04e758a2f0be6fe688a87ea13d780234c3dc
-
Filesize
78KB
MD53969250f6779a52f5217a773142fa29b
SHA1551085d63d4e6f6b4ff447151ce3c728c2721259
SHA256def641836f8276d468e4340dc2bfb05643c5b10d71698936a03e669384d19f13
SHA5123d47b825a854969c734889ad94fcbbdf0470a34a0b134e45b3cd5a2872515ce5d6f08f2b58190da18a758681ec2c42b9646ab93e83d0bd17c7df441bb4e1392a
-
Filesize
78KB
MD53969250f6779a52f5217a773142fa29b
SHA1551085d63d4e6f6b4ff447151ce3c728c2721259
SHA256def641836f8276d468e4340dc2bfb05643c5b10d71698936a03e669384d19f13
SHA5123d47b825a854969c734889ad94fcbbdf0470a34a0b134e45b3cd5a2872515ce5d6f08f2b58190da18a758681ec2c42b9646ab93e83d0bd17c7df441bb4e1392a
-
Filesize
78KB
MD53969250f6779a52f5217a773142fa29b
SHA1551085d63d4e6f6b4ff447151ce3c728c2721259
SHA256def641836f8276d468e4340dc2bfb05643c5b10d71698936a03e669384d19f13
SHA5123d47b825a854969c734889ad94fcbbdf0470a34a0b134e45b3cd5a2872515ce5d6f08f2b58190da18a758681ec2c42b9646ab93e83d0bd17c7df441bb4e1392a
-
Filesize
290B
MD584959b68b9983579de32faaef26048b4
SHA1fe3fd5f3cd5cea1bcf0ba4adb5d81845305bfd27
SHA25601da95622ad027285d2c7d85af3927cacf02cb1f075ba704fe5e0a7960427e8c
SHA512235d3465c496769aec214507152238d718f7a61b0a899eae5355d33d1e9e25cd36ec65ed7cbc4826a82bffc97fae4aca5b4268d8e7f5513c60a46a72067a4b85