Analysis
-
max time kernel
154s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2023, 08:24
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.ca73ff468d48e456a45d29b1a7927120.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.ca73ff468d48e456a45d29b1a7927120.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.ca73ff468d48e456a45d29b1a7927120.exe
-
Size
39KB
-
MD5
ca73ff468d48e456a45d29b1a7927120
-
SHA1
382398f83abe9be245558f02feb8544fc7fbadd1
-
SHA256
0188f47e6a620863c9b6661a197d570cea8ab43ff6dcbb8388f3e6a310ccdfea
-
SHA512
79e872268162ec085d15f2f9d3b3ba5ce48d2403aa6b381b126a034e4799b0190b9d032a63304b66df3347f804c627f78a865fafbdbbd2efdf32e58279b9f956
-
SSDEEP
768:om05k4mjNmntC2ojHXRrs9sINeZEtejlIkoLN127BFVn2p4lAnZ8Oqt+D3Dy1r0A:q+vjNmnVojXRrs9sINeZEtejlIkoLN1u
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation NEAS.ca73ff468d48e456a45d29b1a7927120.exe -
Executes dropped EXE 1 IoCs
pid Process 2508 realupdater.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2508 2760 NEAS.ca73ff468d48e456a45d29b1a7927120.exe 95 PID 2760 wrote to memory of 2508 2760 NEAS.ca73ff468d48e456a45d29b1a7927120.exe 95 PID 2760 wrote to memory of 2508 2760 NEAS.ca73ff468d48e456a45d29b1a7927120.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.ca73ff468d48e456a45d29b1a7927120.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.ca73ff468d48e456a45d29b1a7927120.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\realupdater.exe"C:\Users\Admin\AppData\Local\Temp\realupdater.exe"2⤵
- Executes dropped EXE
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD51f97641675b7a18610b56622cbe433bd
SHA1e5205609148c20ebbfd07beddcee58e220bbada0
SHA256330f85f90ea38ca691135f9298a4d998f41b2cc7060153ce6f6174abf13e5514
SHA5129684aee78d9cb97ca6d041de9b09237e2fa39c73f4ce5dd94ba5e656ef887f9bf96fa3c7eca6237dc29f638c893a8f199bc31fe8622db1c3076fd9201ec0202d
-
Filesize
40KB
MD51f97641675b7a18610b56622cbe433bd
SHA1e5205609148c20ebbfd07beddcee58e220bbada0
SHA256330f85f90ea38ca691135f9298a4d998f41b2cc7060153ce6f6174abf13e5514
SHA5129684aee78d9cb97ca6d041de9b09237e2fa39c73f4ce5dd94ba5e656ef887f9bf96fa3c7eca6237dc29f638c893a8f199bc31fe8622db1c3076fd9201ec0202d
-
Filesize
40KB
MD51f97641675b7a18610b56622cbe433bd
SHA1e5205609148c20ebbfd07beddcee58e220bbada0
SHA256330f85f90ea38ca691135f9298a4d998f41b2cc7060153ce6f6174abf13e5514
SHA5129684aee78d9cb97ca6d041de9b09237e2fa39c73f4ce5dd94ba5e656ef887f9bf96fa3c7eca6237dc29f638c893a8f199bc31fe8622db1c3076fd9201ec0202d