Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2023, 14:10
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0ed1fba0a7285187d8eade34d9c5a180.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.0ed1fba0a7285187d8eade34d9c5a180.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.0ed1fba0a7285187d8eade34d9c5a180.exe
-
Size
50KB
-
MD5
0ed1fba0a7285187d8eade34d9c5a180
-
SHA1
803d16ffc38a0bce5943c8bbe855653f277916e6
-
SHA256
3b52d1cf0babe23278d52bc17690c26b248c5da688bf642fd50eebcc60bd3499
-
SHA512
e349e37519a296d9c1ee734d7580c614e1d106f7360b799d15512315e3495d332cc80bc4b34b42a09fb924c9d43bc5ce8a0f44b336be563a1300f324d4205a50
-
SSDEEP
768:qRVyGrbqomOIPpkbWJu8T3maD2o28H1w4Btp:CXIOAowuQVw4Btp
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation NEAS.0ed1fba0a7285187d8eade34d9c5a180.exe -
Executes dropped EXE 1 IoCs
pid Process 220 segnc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2716 wrote to memory of 220 2716 NEAS.0ed1fba0a7285187d8eade34d9c5a180.exe 91 PID 2716 wrote to memory of 220 2716 NEAS.0ed1fba0a7285187d8eade34d9c5a180.exe 91 PID 2716 wrote to memory of 220 2716 NEAS.0ed1fba0a7285187d8eade34d9c5a180.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.0ed1fba0a7285187d8eade34d9c5a180.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.0ed1fba0a7285187d8eade34d9c5a180.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\segnc.exe"C:\Users\Admin\AppData\Local\Temp\segnc.exe"2⤵
- Executes dropped EXE
PID:220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD57a3c8dcc8e0fdcce8c69a781d19458a7
SHA1b7af02c90e3982aec893189d5b376153285c5261
SHA256bed79f808d576dca5fd4f275a8ac78feed389fa333519cc2994684f795d1630a
SHA5122460783934a45f82b702d96129836de4eb1be9c6e282b4371b9c2ff5279941417be4142f1049da449160a6d75ced39e3373eb145b75244af1447882c5d18ae26
-
Filesize
50KB
MD57a3c8dcc8e0fdcce8c69a781d19458a7
SHA1b7af02c90e3982aec893189d5b376153285c5261
SHA256bed79f808d576dca5fd4f275a8ac78feed389fa333519cc2994684f795d1630a
SHA5122460783934a45f82b702d96129836de4eb1be9c6e282b4371b9c2ff5279941417be4142f1049da449160a6d75ced39e3373eb145b75244af1447882c5d18ae26
-
Filesize
50KB
MD57a3c8dcc8e0fdcce8c69a781d19458a7
SHA1b7af02c90e3982aec893189d5b376153285c5261
SHA256bed79f808d576dca5fd4f275a8ac78feed389fa333519cc2994684f795d1630a
SHA5122460783934a45f82b702d96129836de4eb1be9c6e282b4371b9c2ff5279941417be4142f1049da449160a6d75ced39e3373eb145b75244af1447882c5d18ae26