Analysis
-
max time kernel
184s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2023, 08:33
Behavioral task
behavioral1
Sample
NEAS.00e88e3ce274240256760a7ac9ebe8b0.exe
Resource
win7-20231020-en
General
-
Target
NEAS.00e88e3ce274240256760a7ac9ebe8b0.exe
-
Size
289KB
-
MD5
00e88e3ce274240256760a7ac9ebe8b0
-
SHA1
4ec2b317a7e5eedd1ca6b7b99db52ed4863bd65a
-
SHA256
4221a10ee79d1507ee5152a9eddad6430f7de57e9746e85a93f89cbea91ac36f
-
SHA512
29f24ad9d2798218f6f861426a74d03ecdd60050d7df971916dfae9d0f86529c71b4ce8346dbce8aa584de1f4bcb0e17fecdc1430e34f1b53d444c98be745307
-
SSDEEP
6144:vgE7TPeAJSCvJmquWT52nhojpJj+mKuGoS7zvR:vRPeaJmXWF2nhwph+mYoSJ
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
218.54.31.165
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Control Panel\International\Geo\Nation NEAS.00e88e3ce274240256760a7ac9ebe8b0.exe -
Executes dropped EXE 1 IoCs
pid Process 5100 nudoh.exe -
resource yara_rule behavioral2/memory/1828-0-0x0000000000400000-0x0000000000475000-memory.dmp upx behavioral2/memory/1828-3-0x0000000000400000-0x0000000000475000-memory.dmp upx behavioral2/files/0x0007000000022df1-8.dat upx behavioral2/files/0x0007000000022df1-10.dat upx behavioral2/memory/5100-13-0x0000000000400000-0x0000000000475000-memory.dmp upx behavioral2/files/0x0007000000022df1-12.dat upx behavioral2/memory/1828-16-0x0000000000400000-0x0000000000475000-memory.dmp upx behavioral2/memory/5100-19-0x0000000000400000-0x0000000000475000-memory.dmp upx behavioral2/memory/5100-20-0x0000000000400000-0x0000000000475000-memory.dmp upx behavioral2/memory/5100-22-0x0000000000400000-0x0000000000475000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1828 wrote to memory of 5100 1828 NEAS.00e88e3ce274240256760a7ac9ebe8b0.exe 86 PID 1828 wrote to memory of 5100 1828 NEAS.00e88e3ce274240256760a7ac9ebe8b0.exe 86 PID 1828 wrote to memory of 5100 1828 NEAS.00e88e3ce274240256760a7ac9ebe8b0.exe 86 PID 1828 wrote to memory of 3424 1828 NEAS.00e88e3ce274240256760a7ac9ebe8b0.exe 87 PID 1828 wrote to memory of 3424 1828 NEAS.00e88e3ce274240256760a7ac9ebe8b0.exe 87 PID 1828 wrote to memory of 3424 1828 NEAS.00e88e3ce274240256760a7ac9ebe8b0.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.00e88e3ce274240256760a7ac9ebe8b0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.00e88e3ce274240256760a7ac9ebe8b0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\nudoh.exe"C:\Users\Admin\AppData\Local\Temp\nudoh.exe"2⤵
- Executes dropped EXE
PID:5100
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵PID:3424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
286B
MD5285e1d4e6454338bc6ad551e71f7bfee
SHA1506df8f9b62905f09fd4cba441ee3951d286558b
SHA256ada7a454584f8da873f52da47b48d07d1aa5c82640783f844802c9eee5047987
SHA512e27386f5de510409df46c2daa7cc79f984a63fed3292979e745c26fd9b1055f8c4eda66b3d070103a942124b06dc3170f237ebe2eac22936477eb14da825ce5e
-
Filesize
512B
MD5532708613e7d8c34dde8d934a919e44b
SHA1b4c0e4f5949e3ff448bb187462abfa9074c92dd5
SHA2565c3e7c53fa7f08d99bc7afc4de08da75ca9d5577f48f74bb7f6d7fc163a7596f
SHA512bd14f06082795fd1a6a11f24654bd907c83371d1ef5a57ee3ca4a3ee99b44c18fb494e7d04a0b6eb198f5c8d9842e96c38e0c694bd49ce77453324a90b957a48
-
Filesize
289KB
MD52680f8f8987c5108220e4774028a35ab
SHA1001cd1291b75bbb804634bbab3c03bf8c907aa6d
SHA2567bd541ee325fbbd1c06270c6e233bcc36cfe3d03c2cf2dab8bc16ba631247ae9
SHA512202f6c18e1b2600e4accbf02af65020fdc7c17f924242772229c62316997d82cafcc5d8c42f55b7b3a64bbf019b6d1cd9c5222d0f8153b222c1c94eb8ca6a341
-
Filesize
289KB
MD52680f8f8987c5108220e4774028a35ab
SHA1001cd1291b75bbb804634bbab3c03bf8c907aa6d
SHA2567bd541ee325fbbd1c06270c6e233bcc36cfe3d03c2cf2dab8bc16ba631247ae9
SHA512202f6c18e1b2600e4accbf02af65020fdc7c17f924242772229c62316997d82cafcc5d8c42f55b7b3a64bbf019b6d1cd9c5222d0f8153b222c1c94eb8ca6a341
-
Filesize
289KB
MD52680f8f8987c5108220e4774028a35ab
SHA1001cd1291b75bbb804634bbab3c03bf8c907aa6d
SHA2567bd541ee325fbbd1c06270c6e233bcc36cfe3d03c2cf2dab8bc16ba631247ae9
SHA512202f6c18e1b2600e4accbf02af65020fdc7c17f924242772229c62316997d82cafcc5d8c42f55b7b3a64bbf019b6d1cd9c5222d0f8153b222c1c94eb8ca6a341