Analysis
-
max time kernel
154s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2023 10:17
Behavioral task
behavioral1
Sample
NEAS.d8c4d3161d6b42204aa812b68bf6e9f0_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.d8c4d3161d6b42204aa812b68bf6e9f0_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.d8c4d3161d6b42204aa812b68bf6e9f0_JC.exe
-
Size
86KB
-
MD5
d8c4d3161d6b42204aa812b68bf6e9f0
-
SHA1
9f0b3dbf7c4dce6763439312a302125629089fa0
-
SHA256
92a668b1f97dbee461be37ffc463f15e3eac6a87cdd206b15f5f4deff09e2d18
-
SHA512
08f94e196d884f1ff5eb87a99c5da52670231e7875b994c7873063c69622017e8af568280985a642a0760efc6a8d0a1311871bbf93ae5b5afd59a01c03bb5bba
-
SSDEEP
768:MiPPTYiNofyZPRxAN2NABnYMmw9YcTmcbryywx:MgrxANPe49YOIHx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Control Panel\International\Geo\Nation NEAS.d8c4d3161d6b42204aa812b68bf6e9f0_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 2840 hromi.exe -
resource yara_rule behavioral2/memory/4068-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x00090000000222f4-5.dat upx behavioral2/files/0x00090000000222f4-7.dat upx behavioral2/memory/4068-9-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x00090000000222f4-8.dat upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4068 wrote to memory of 2840 4068 NEAS.d8c4d3161d6b42204aa812b68bf6e9f0_JC.exe 89 PID 4068 wrote to memory of 2840 4068 NEAS.d8c4d3161d6b42204aa812b68bf6e9f0_JC.exe 89 PID 4068 wrote to memory of 2840 4068 NEAS.d8c4d3161d6b42204aa812b68bf6e9f0_JC.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d8c4d3161d6b42204aa812b68bf6e9f0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d8c4d3161d6b42204aa812b68bf6e9f0_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\hromi.exe"C:\Users\Admin\AppData\Local\Temp\hromi.exe"2⤵
- Executes dropped EXE
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD5bebbdc8a73f3fa1b7aef63a84fba0390
SHA1688c27b8b41c0e5009b6bb632047099b4c223af5
SHA256a7c02ff7a40160a7c61060c88bf0418bc68578cea433d4d87095d3cc5f320dc3
SHA5126047c09048c5a6106f1be3e9f858db7463534966abf4dabcb63517f3a6b19262d61e5cb652c9d8dca723ea62ab0a5b29edd68a1cd76e600998477196cc98a3a0
-
Filesize
86KB
MD5bebbdc8a73f3fa1b7aef63a84fba0390
SHA1688c27b8b41c0e5009b6bb632047099b4c223af5
SHA256a7c02ff7a40160a7c61060c88bf0418bc68578cea433d4d87095d3cc5f320dc3
SHA5126047c09048c5a6106f1be3e9f858db7463534966abf4dabcb63517f3a6b19262d61e5cb652c9d8dca723ea62ab0a5b29edd68a1cd76e600998477196cc98a3a0
-
Filesize
86KB
MD5bebbdc8a73f3fa1b7aef63a84fba0390
SHA1688c27b8b41c0e5009b6bb632047099b4c223af5
SHA256a7c02ff7a40160a7c61060c88bf0418bc68578cea433d4d87095d3cc5f320dc3
SHA5126047c09048c5a6106f1be3e9f858db7463534966abf4dabcb63517f3a6b19262d61e5cb652c9d8dca723ea62ab0a5b29edd68a1cd76e600998477196cc98a3a0