Analysis

  • max time kernel
    143s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/11/2023, 10:36

General

  • Target

    NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe

  • Size

    387KB

  • MD5

    6b3a1b992a5d922cd5078351d34bf5d0

  • SHA1

    8ecf6685a2c10aac00494ddcbeccce570e49e8f6

  • SHA256

    de3ba15de8962328e31efdea0185ca36ff87e085e360b2fe536df0cbcabc2c33

  • SHA512

    a9b867f3afb556443e63fd10547b52ad8a3ff8b5c2a9d1c6b77a75ba4d90d1a65ae45945c25bd6bfde6eee3f9d7b16f9a75084a81ce2b73de0db628b059e37c3

  • SSDEEP

    1536:JXBYjfC24mFVsIgvo3X4iZpTha5VlA8mx7aoL8mo:JX+0mFmIgvo4iZhha5rEaoL8z

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.6b3a1b992a5d922cd5078351d34bf5d0.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4644
    • C:\Program Files (x86)\b5922bd9\jusched.exe
      "C:\Program Files (x86)\b5922bd9\jusched.exe"
      2⤵
      • Executes dropped EXE
      PID:1928

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\b5922bd9\b5922bd9

          Filesize

          17B

          MD5

          bff3d8f76e182194c4a2abf1aabba9f3

          SHA1

          07e5b604bb505a800b3e0ac16fee483b70595768

          SHA256

          6bc8a4f93eaa1b3e7cfa696855bf6a852cf6555d694bc03e337261a27e58246f

          SHA512

          0c5def3bb01ed166d4135190e131c27be4b6039987e269b6c3fca07677b3c637868397f207df631a098182a6bd3c795e6dd34541f82c5ecd6062441af0af7f50

        • C:\Program Files (x86)\b5922bd9\info_a

          Filesize

          12B

          MD5

          f7a7fd6e563bde76327f4ffd3c7f2bf9

          SHA1

          2c144e47262d4b0578a435a3e07af9f835cf1fda

          SHA256

          16fe538976c3f36dc9ada8ec11e14e5a33d30402b63ed24c7ed9bbb306d1877d

          SHA512

          73122338b468fb45fd31d25b37e812bbd0d3057e0b7b521663b392117d81bcd9240d30dd2e395c89bee329e23b32ad95ce4208667ad38455965aef43007402b3

        • C:\Program Files (x86)\b5922bd9\jusched.exe

          Filesize

          387KB

          MD5

          ebb0cce5fed022a3b2d36bc4b51e1c92

          SHA1

          af2c73a7b1777698ef7c2e7825fb5c4b59b5b7d3

          SHA256

          10f01b12e383d9d0c24d24e50c2dba1f9e63c76931d0dcf944e545097e169cf6

          SHA512

          f9b6f9b9c707a29bcdd912efddceb67854e389a38bf0cbfe5db49c04469e73535897b81761747720334a8e587f0d225729b44457f00e85c143f23ec72125e313

        • C:\Program Files (x86)\b5922bd9\jusched.exe

          Filesize

          387KB

          MD5

          ebb0cce5fed022a3b2d36bc4b51e1c92

          SHA1

          af2c73a7b1777698ef7c2e7825fb5c4b59b5b7d3

          SHA256

          10f01b12e383d9d0c24d24e50c2dba1f9e63c76931d0dcf944e545097e169cf6

          SHA512

          f9b6f9b9c707a29bcdd912efddceb67854e389a38bf0cbfe5db49c04469e73535897b81761747720334a8e587f0d225729b44457f00e85c143f23ec72125e313

        • C:\Program Files (x86)\b5922bd9\jusched.exe

          Filesize

          387KB

          MD5

          ebb0cce5fed022a3b2d36bc4b51e1c92

          SHA1

          af2c73a7b1777698ef7c2e7825fb5c4b59b5b7d3

          SHA256

          10f01b12e383d9d0c24d24e50c2dba1f9e63c76931d0dcf944e545097e169cf6

          SHA512

          f9b6f9b9c707a29bcdd912efddceb67854e389a38bf0cbfe5db49c04469e73535897b81761747720334a8e587f0d225729b44457f00e85c143f23ec72125e313

        • memory/1928-16-0x0000000000400000-0x0000000000472000-memory.dmp

          Filesize

          456KB

        • memory/1928-19-0x0000000000400000-0x0000000000472000-memory.dmp

          Filesize

          456KB

        • memory/4644-0-0x0000000000400000-0x0000000000472000-memory.dmp

          Filesize

          456KB

        • memory/4644-4-0x0000000000400000-0x0000000000472000-memory.dmp

          Filesize

          456KB

        • memory/4644-17-0x0000000000400000-0x0000000000472000-memory.dmp

          Filesize

          456KB