Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2023, 10:36
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe
-
Size
387KB
-
MD5
6b3a1b992a5d922cd5078351d34bf5d0
-
SHA1
8ecf6685a2c10aac00494ddcbeccce570e49e8f6
-
SHA256
de3ba15de8962328e31efdea0185ca36ff87e085e360b2fe536df0cbcabc2c33
-
SHA512
a9b867f3afb556443e63fd10547b52ad8a3ff8b5c2a9d1c6b77a75ba4d90d1a65ae45945c25bd6bfde6eee3f9d7b16f9a75084a81ce2b73de0db628b059e37c3
-
SSDEEP
1536:JXBYjfC24mFVsIgvo3X4iZpTha5VlA8mx7aoL8mo:JX+0mFmIgvo4iZhha5rEaoL8z
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe -
Executes dropped EXE 1 IoCs
pid Process 1928 jusched.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\b5922bd9\jusched.exe NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe File created C:\Program Files (x86)\b5922bd9\b5922bd9 NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe File created C:\Program Files (x86)\b5922bd9\info_a NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4644 wrote to memory of 1928 4644 NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe 96 PID 4644 wrote to memory of 1928 4644 NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe 96 PID 4644 wrote to memory of 1928 4644 NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Program Files (x86)\b5922bd9\jusched.exe"C:\Program Files (x86)\b5922bd9\jusched.exe"2⤵
- Executes dropped EXE
PID:1928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD5bff3d8f76e182194c4a2abf1aabba9f3
SHA107e5b604bb505a800b3e0ac16fee483b70595768
SHA2566bc8a4f93eaa1b3e7cfa696855bf6a852cf6555d694bc03e337261a27e58246f
SHA5120c5def3bb01ed166d4135190e131c27be4b6039987e269b6c3fca07677b3c637868397f207df631a098182a6bd3c795e6dd34541f82c5ecd6062441af0af7f50
-
Filesize
12B
MD5f7a7fd6e563bde76327f4ffd3c7f2bf9
SHA12c144e47262d4b0578a435a3e07af9f835cf1fda
SHA25616fe538976c3f36dc9ada8ec11e14e5a33d30402b63ed24c7ed9bbb306d1877d
SHA51273122338b468fb45fd31d25b37e812bbd0d3057e0b7b521663b392117d81bcd9240d30dd2e395c89bee329e23b32ad95ce4208667ad38455965aef43007402b3
-
Filesize
387KB
MD5ebb0cce5fed022a3b2d36bc4b51e1c92
SHA1af2c73a7b1777698ef7c2e7825fb5c4b59b5b7d3
SHA25610f01b12e383d9d0c24d24e50c2dba1f9e63c76931d0dcf944e545097e169cf6
SHA512f9b6f9b9c707a29bcdd912efddceb67854e389a38bf0cbfe5db49c04469e73535897b81761747720334a8e587f0d225729b44457f00e85c143f23ec72125e313
-
Filesize
387KB
MD5ebb0cce5fed022a3b2d36bc4b51e1c92
SHA1af2c73a7b1777698ef7c2e7825fb5c4b59b5b7d3
SHA25610f01b12e383d9d0c24d24e50c2dba1f9e63c76931d0dcf944e545097e169cf6
SHA512f9b6f9b9c707a29bcdd912efddceb67854e389a38bf0cbfe5db49c04469e73535897b81761747720334a8e587f0d225729b44457f00e85c143f23ec72125e313
-
Filesize
387KB
MD5ebb0cce5fed022a3b2d36bc4b51e1c92
SHA1af2c73a7b1777698ef7c2e7825fb5c4b59b5b7d3
SHA25610f01b12e383d9d0c24d24e50c2dba1f9e63c76931d0dcf944e545097e169cf6
SHA512f9b6f9b9c707a29bcdd912efddceb67854e389a38bf0cbfe5db49c04469e73535897b81761747720334a8e587f0d225729b44457f00e85c143f23ec72125e313