Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2023 20:57
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d846d479240efa3313bcce9534725190_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.d846d479240efa3313bcce9534725190_JC.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.d846d479240efa3313bcce9534725190_JC.exe
-
Size
1.8MB
-
MD5
d846d479240efa3313bcce9534725190
-
SHA1
a6b3be5f81edf6e2823a19dac1b6eb882357a174
-
SHA256
58416b176f97c07e7126d53c56c5b039f78adedbc6fb67094855548ee3b8f7ba
-
SHA512
236e6e4df70c483a4147729df34efea387c0e810fbbe60c26f79d5900bb6091d1845d0cadb194f594e4214f96a85c59e56671354b0c702fd6d54ebba609be67d
-
SSDEEP
49152:wWhr59BfJXAE+UJDyWh2Rmwj++kA75EVdZod:wWhrPBfKEneWhumwq/Qq6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation NEAS.d846d479240efa3313bcce9534725190_JC.exe -
Loads dropped DLL 4 IoCs
pid Process 4680 rundll32.exe 4680 rundll32.exe 1456 rundll32.exe 1456 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000_Classes\Local Settings NEAS.d846d479240efa3313bcce9534725190_JC.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1164 wrote to memory of 4476 1164 NEAS.d846d479240efa3313bcce9534725190_JC.exe 89 PID 1164 wrote to memory of 4476 1164 NEAS.d846d479240efa3313bcce9534725190_JC.exe 89 PID 1164 wrote to memory of 4476 1164 NEAS.d846d479240efa3313bcce9534725190_JC.exe 89 PID 4476 wrote to memory of 4680 4476 control.exe 91 PID 4476 wrote to memory of 4680 4476 control.exe 91 PID 4476 wrote to memory of 4680 4476 control.exe 91 PID 4680 wrote to memory of 2708 4680 rundll32.exe 93 PID 4680 wrote to memory of 2708 4680 rundll32.exe 93 PID 2708 wrote to memory of 1456 2708 RunDll32.exe 95 PID 2708 wrote to memory of 1456 2708 RunDll32.exe 95 PID 2708 wrote to memory of 1456 2708 RunDll32.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d846d479240efa3313bcce9534725190_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d846d479240efa3313bcce9534725190_JC.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\qB4Q22K0.CPL",2⤵
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\qB4Q22K0.CPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\qB4Q22K0.CPL",4⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\qB4Q22K0.CPL",5⤵
- Loads dropped DLL
PID:1456
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD560f22c16c679a8d488de57bd63b90962
SHA1c066dd0969a5490ec30d2849abb8424cacc4ea6d
SHA256fff463d5766db8cd0443b6fc0b0ae4b55e39727110ac40dc640cfcb35d5be4c0
SHA512fecb2da87dda5730ce64b475b901f1d4b361f1c857b57792c02a53ad05b520cdd895d17bcc0ef2f7cd378774dde67cbf09bf1a70de6985c938e7135ddb262e4b
-
Filesize
1.4MB
MD560f22c16c679a8d488de57bd63b90962
SHA1c066dd0969a5490ec30d2849abb8424cacc4ea6d
SHA256fff463d5766db8cd0443b6fc0b0ae4b55e39727110ac40dc640cfcb35d5be4c0
SHA512fecb2da87dda5730ce64b475b901f1d4b361f1c857b57792c02a53ad05b520cdd895d17bcc0ef2f7cd378774dde67cbf09bf1a70de6985c938e7135ddb262e4b
-
Filesize
1.4MB
MD560f22c16c679a8d488de57bd63b90962
SHA1c066dd0969a5490ec30d2849abb8424cacc4ea6d
SHA256fff463d5766db8cd0443b6fc0b0ae4b55e39727110ac40dc640cfcb35d5be4c0
SHA512fecb2da87dda5730ce64b475b901f1d4b361f1c857b57792c02a53ad05b520cdd895d17bcc0ef2f7cd378774dde67cbf09bf1a70de6985c938e7135ddb262e4b
-
Filesize
1.4MB
MD560f22c16c679a8d488de57bd63b90962
SHA1c066dd0969a5490ec30d2849abb8424cacc4ea6d
SHA256fff463d5766db8cd0443b6fc0b0ae4b55e39727110ac40dc640cfcb35d5be4c0
SHA512fecb2da87dda5730ce64b475b901f1d4b361f1c857b57792c02a53ad05b520cdd895d17bcc0ef2f7cd378774dde67cbf09bf1a70de6985c938e7135ddb262e4b
-
Filesize
1.4MB
MD560f22c16c679a8d488de57bd63b90962
SHA1c066dd0969a5490ec30d2849abb8424cacc4ea6d
SHA256fff463d5766db8cd0443b6fc0b0ae4b55e39727110ac40dc640cfcb35d5be4c0
SHA512fecb2da87dda5730ce64b475b901f1d4b361f1c857b57792c02a53ad05b520cdd895d17bcc0ef2f7cd378774dde67cbf09bf1a70de6985c938e7135ddb262e4b
-
Filesize
1.4MB
MD560f22c16c679a8d488de57bd63b90962
SHA1c066dd0969a5490ec30d2849abb8424cacc4ea6d
SHA256fff463d5766db8cd0443b6fc0b0ae4b55e39727110ac40dc640cfcb35d5be4c0
SHA512fecb2da87dda5730ce64b475b901f1d4b361f1c857b57792c02a53ad05b520cdd895d17bcc0ef2f7cd378774dde67cbf09bf1a70de6985c938e7135ddb262e4b