Analysis
-
max time kernel
131s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2023 06:08
Behavioral task
behavioral1
Sample
NEAS.23e3413d94481ec0f10a8c1800d139c0_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.23e3413d94481ec0f10a8c1800d139c0_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.23e3413d94481ec0f10a8c1800d139c0_JC.exe
-
Size
577KB
-
MD5
23e3413d94481ec0f10a8c1800d139c0
-
SHA1
017aaef6e9b85bc50ef7f932ae6a3b8f2a6d5884
-
SHA256
84ce24184429f2b22cda2a4de5eca91f9de00eea3ea929cab3a3397dde0e85cc
-
SHA512
f44089030f6749585e9937ea29e4f35927fae8753bce88b9aa2841c1b65231e0e53993841cba33136676d8e77ef201b630138debcdcea6cecd6aee9c75340b05
-
SSDEEP
6144:3+LQwhNI65MY5wH2l3D5YolYvRjf6yl/5JTFw1iKzHk2oGbksEG5iFeeGU:3MQwA65YHWDeXvRjf6YnyixGbkMoLL
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation NEAS.23e3413d94481ec0f10a8c1800d139c0_JC.exe -
resource yara_rule behavioral2/memory/4788-1-0x0000000000400000-0x0000000001C5C000-memory.dmp upx behavioral2/memory/4788-3-0x0000000000400000-0x0000000001C5C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 4580 systeminfo.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 552 PING.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4788 wrote to memory of 5044 4788 NEAS.23e3413d94481ec0f10a8c1800d139c0_JC.exe 90 PID 4788 wrote to memory of 5044 4788 NEAS.23e3413d94481ec0f10a8c1800d139c0_JC.exe 90 PID 4788 wrote to memory of 5044 4788 NEAS.23e3413d94481ec0f10a8c1800d139c0_JC.exe 90 PID 5044 wrote to memory of 4580 5044 cmd.exe 92 PID 5044 wrote to memory of 4580 5044 cmd.exe 92 PID 5044 wrote to memory of 4580 5044 cmd.exe 92 PID 5044 wrote to memory of 552 5044 cmd.exe 101 PID 5044 wrote to memory of 552 5044 cmd.exe 101 PID 5044 wrote to memory of 552 5044 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.23e3413d94481ec0f10a8c1800d139c0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.23e3413d94481ec0f10a8c1800d139c0_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c systeminfo>>C:\Windows\temp\setup_gitlog.txt&ping 8.8.8.8>>C:\Windows\temp\setup_gitlog.txt2⤵
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:4580
-
-
C:\Windows\SysWOW64\PING.EXEping 8.8.8.83⤵
- Runs ping.exe
PID:552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33B
MD5346bbdef8e66561ce4c33013160d7c75
SHA1023e40d5eb04b2d7e8346ea0c9a62b05d372abec
SHA256ce357dc9d96cbb6933f7895d5fee9052b72733c2db9fc32b1555761b1bd0c277
SHA512f2fd0412846455ee0f47f9e88192ea4c6ee60c3118be40a44c9b626566652ed46b1c3a0708a7ec6feba7a9cafc61091a2a1c6cb864a99a081bb842625040594f