Analysis
-
max time kernel
137s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2023 19:57
Behavioral task
behavioral1
Sample
NEAS.631d7c169bb95bbce7b1c16238b01040_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.631d7c169bb95bbce7b1c16238b01040_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.631d7c169bb95bbce7b1c16238b01040_JC.exe
-
Size
577KB
-
MD5
631d7c169bb95bbce7b1c16238b01040
-
SHA1
38404a1e0d2afd5eb51927e1f7c27e1b9a8dac35
-
SHA256
06affe06c2b205afd192f38ad86157bc1c5c75d12219cc569de187c9fb9d4b04
-
SHA512
4033292a831d9afdbc79d10cb108e7b242d2dde9151f43c2c5230a430cb666fbc2880e6d965bb2a984c5d9de855b198c6825d806e6884a415e92bd53a9b13c2d
-
SSDEEP
6144:Z+LQwhNI65MY5wH2l3D5YolYvRjf6yl/5JTFw1iKzHk2oGbksEG5iFeeGa:ZMQwA65YHWDeXvRjf6YnyixGbkMoLt
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation NEAS.631d7c169bb95bbce7b1c16238b01040_JC.exe -
resource yara_rule behavioral2/memory/4728-1-0x0000000000400000-0x0000000001C5C000-memory.dmp upx behavioral2/memory/4728-3-0x0000000000400000-0x0000000001C5C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 3220 systeminfo.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1604 PING.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4728 wrote to memory of 1900 4728 NEAS.631d7c169bb95bbce7b1c16238b01040_JC.exe 84 PID 4728 wrote to memory of 1900 4728 NEAS.631d7c169bb95bbce7b1c16238b01040_JC.exe 84 PID 4728 wrote to memory of 1900 4728 NEAS.631d7c169bb95bbce7b1c16238b01040_JC.exe 84 PID 1900 wrote to memory of 3220 1900 cmd.exe 86 PID 1900 wrote to memory of 3220 1900 cmd.exe 86 PID 1900 wrote to memory of 3220 1900 cmd.exe 86 PID 1900 wrote to memory of 1604 1900 cmd.exe 92 PID 1900 wrote to memory of 1604 1900 cmd.exe 92 PID 1900 wrote to memory of 1604 1900 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.631d7c169bb95bbce7b1c16238b01040_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.631d7c169bb95bbce7b1c16238b01040_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c systeminfo>>C:\Windows\temp\setup_gitlog.txt&ping 8.8.8.8>>C:\Windows\temp\setup_gitlog.txt2⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:3220
-
-
C:\Windows\SysWOW64\PING.EXEping 8.8.8.83⤵
- Runs ping.exe
PID:1604
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33B
MD5346bbdef8e66561ce4c33013160d7c75
SHA1023e40d5eb04b2d7e8346ea0c9a62b05d372abec
SHA256ce357dc9d96cbb6933f7895d5fee9052b72733c2db9fc32b1555761b1bd0c277
SHA512f2fd0412846455ee0f47f9e88192ea4c6ee60c3118be40a44c9b626566652ed46b1c3a0708a7ec6feba7a9cafc61091a2a1c6cb864a99a081bb842625040594f