Analysis
-
max time kernel
155s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2023, 09:47
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe
-
Size
1.8MB
-
MD5
d0a28f18cc0e05ed87f45a02d48f2650
-
SHA1
27759f6abcb448599785ae8038e83556bed86933
-
SHA256
c5c40e5cb6448b41c0b37e715217fccc1f28a8832831de35a32e7208d3c5008a
-
SHA512
e88f07dd47003ad2eca0fc9f093a74bd8c39ae38825092a3e1ca6939fdb08dd4f26c07daa14eb796d0590d2f91dab5067939bac5c5d755a27fd92e28efbee18f
-
SSDEEP
49152:sFc0E7mAG1pZi/Q/GdbAvHcSd+IUOS4+duX5uq3lxAq:sWFmN/wrdUHrwWS4lXblxb
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0008000000022c9c-1.dat acprotect behavioral2/files/0x0008000000022c9c-32.dat acprotect behavioral2/files/0x0008000000022c9c-31.dat acprotect -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation Setup.exe -
Executes dropped EXE 5 IoCs
pid Process 2580 Setup.exe 2764 Auto.exe 1768 PING.EXE 3984 taskkill.exe 3172 BOOTICE.exe -
Loads dropped DLL 6 IoCs
pid Process 3540 NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe 4852 NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe 2764 Auto.exe 2764 Auto.exe 3540 NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe 3540 NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe -
resource yara_rule behavioral2/files/0x0008000000022c9c-1.dat upx behavioral2/memory/3540-3-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4852-33-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/files/0x0008000000022c9c-32.dat upx behavioral2/files/0x0008000000022c9c-31.dat upx behavioral2/memory/3540-35-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4852-39-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/3540-44-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/3540-64-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4852-77-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/3540-78-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/3540-91-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/3540-116-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Enumerates connected drives 3 TTPs 3 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: BOOTICE.exe File opened (read-only) \??\Z: BOOTICE.exe File opened (read-only) \??\e: NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\System\symsrv.dll NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe File created \??\c:\program files\common files\system\symsrv.dll.000 NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 2 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 Auto.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName Auto.exe -
Kills process with taskkill 1 IoCs
pid Process 3984 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1768 PING.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3540 NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe 3540 NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe 2764 Auto.exe 2764 Auto.exe 3540 NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe 3540 NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe 3540 NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe 3540 NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 3540 NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe Token: SeDebugPrivilege 4852 NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe Token: SeSystemEnvironmentPrivilege 2764 Auto.exe Token: SeDebugPrivilege 3984 taskkill.exe Token: SeDebugPrivilege 3172 BOOTICE.exe Token: SeAuditPrivilege 3172 BOOTICE.exe Token: SeSecurityPrivilege 3172 BOOTICE.exe Token: SeBackupPrivilege 3172 BOOTICE.exe Token: SeRestorePrivilege 3172 BOOTICE.exe Token: SeTakeOwnershipPrivilege 3172 BOOTICE.exe Token: SeManageVolumePrivilege 3172 BOOTICE.exe Token: SeSystemEnvironmentPrivilege 3172 BOOTICE.exe Token: SeShutdownPrivilege 3172 BOOTICE.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3540 wrote to memory of 4852 3540 NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe 90 PID 3540 wrote to memory of 4852 3540 NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe 90 PID 3540 wrote to memory of 4852 3540 NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe 90 PID 4852 wrote to memory of 2580 4852 NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe 91 PID 4852 wrote to memory of 2580 4852 NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe 91 PID 4852 wrote to memory of 2580 4852 NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe 91 PID 2580 wrote to memory of 3760 2580 Setup.exe 92 PID 2580 wrote to memory of 3760 2580 Setup.exe 92 PID 2580 wrote to memory of 3760 2580 Setup.exe 92 PID 3760 wrote to memory of 2764 3760 cmd.exe 94 PID 3760 wrote to memory of 2764 3760 cmd.exe 94 PID 3760 wrote to memory of 2764 3760 cmd.exe 94 PID 3760 wrote to memory of 1768 3760 cmd.exe 95 PID 3760 wrote to memory of 1768 3760 cmd.exe 95 PID 3760 wrote to memory of 1768 3760 cmd.exe 95 PID 3760 wrote to memory of 3984 3760 cmd.exe 96 PID 3760 wrote to memory of 3984 3760 cmd.exe 96 PID 3760 wrote to memory of 3984 3760 cmd.exe 96 PID 3760 wrote to memory of 3172 3760 cmd.exe 99 PID 3760 wrote to memory of 3172 3760 cmd.exe 99 PID 3760 wrote to memory of 3172 3760 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d0a28f18cc0e05ed87f45a02d48f2650_JC.exe" -sfxwaitall:0 "Setup.exe"2⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Setup.exe"C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Setup.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\SetupPE.cmd" "4⤵
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Auto\Auto.exeAuto\Auto.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\PING.EXEping 127.0.0.1 -n 25⤵
- Executes dropped EXE
- Runs ping.exe
PID:1768
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\taskkill.exetaskkill /f /im Auto.exe5⤵
- Executes dropped EXE
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3984
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\BOOTICE.exeBOOTICE.exe5⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:3172
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
Filesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
Filesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
Filesize
175B
MD51130c911bf5db4b8f7cf9b6f4b457623
SHA148e734c4bc1a8b5399bff4954e54b268bde9d54c
SHA256eba08cc8182f379392a97f542b350ea0dbbe5e4009472f35af20e3d857eafdf1
SHA51294e2511ef2c53494c2aff0960266491ffc0e54e75185427d1ccedae27c286992c754ca94cbb0c9ea36e3f04cd4eb7f032c551cf2d4b309f292906303f1a75fa0
-
Filesize
623KB
MD57ebc3e3cbb94632c2123ff93f3f78df1
SHA100c7c968b55ffb489b55698d4eeab38120b3fb21
SHA2568c39c43dfc44eafd376508ce3294082f277e6561eebc21fc42572e2de4fe2011
SHA512cc5b58e386713fa77fe58802939dc4059a15de88db7f055220c4c0df9a4d1e174bf904349f819c0b57afe4783c3596d12ebec5268eb54c757daecc297ae34abd
-
Filesize
44KB
MD561c48dbb9f317eb4de85470d15d2ba1b
SHA18b2c288ee987735981b2d2a6f3d579e5c35a9753
SHA25643a8cefc2c20d4baf54c72614366d93284a3b9d1e049153ac5ca90a37bd60f2b
SHA512c0e341a8cd7b49eafddc89b95464dff2627751c5ec3a3df265917c44cc6c8a7e5cd8ce0a6ae6899a575909c3f132ba888b3701bc115ddf47ced75f7bb9d7517b
-
Filesize
44KB
MD561c48dbb9f317eb4de85470d15d2ba1b
SHA18b2c288ee987735981b2d2a6f3d579e5c35a9753
SHA25643a8cefc2c20d4baf54c72614366d93284a3b9d1e049153ac5ca90a37bd60f2b
SHA512c0e341a8cd7b49eafddc89b95464dff2627751c5ec3a3df265917c44cc6c8a7e5cd8ce0a6ae6899a575909c3f132ba888b3701bc115ddf47ced75f7bb9d7517b
-
Filesize
589KB
MD5d85f641d4ad19ccaa0761b76aa16e173
SHA1535c58768111e54d4c756bce7909b2d30bf9545e
SHA256a899e1f9b693a24caca2b3cd8e8a95e657447873950516d4521fe7fcc8a1214d
SHA51204dc84f58426491fcfcec91367ef4521ee34d3669585ad4e5658f6dcc1478aa3bbe2b826621ec943fe772ff6761dfd7576f738344d046c8b357db00691ac01cd
-
Filesize
589KB
MD5d85f641d4ad19ccaa0761b76aa16e173
SHA1535c58768111e54d4c756bce7909b2d30bf9545e
SHA256a899e1f9b693a24caca2b3cd8e8a95e657447873950516d4521fe7fcc8a1214d
SHA51204dc84f58426491fcfcec91367ef4521ee34d3669585ad4e5658f6dcc1478aa3bbe2b826621ec943fe772ff6761dfd7576f738344d046c8b357db00691ac01cd
-
Filesize
422KB
MD59a4d2e1963105c3fe42ff5b09b71987c
SHA10d551be963c99b27c683e59057016a9782f2f43f
SHA25619df7f0c82e80d5fd33c8f94f3b649856aa6d69144600a1869c562d1ce2122cf
SHA512200ba5fd7158eacc1ea9ab42ea8a94294652c382624b836582e52bdcf979c37f96c78aba22344de71fa5510843bce02eb4163a304cb44dab300d0f2781aa5278
-
Filesize
422KB
MD59a4d2e1963105c3fe42ff5b09b71987c
SHA10d551be963c99b27c683e59057016a9782f2f43f
SHA25619df7f0c82e80d5fd33c8f94f3b649856aa6d69144600a1869c562d1ce2122cf
SHA512200ba5fd7158eacc1ea9ab42ea8a94294652c382624b836582e52bdcf979c37f96c78aba22344de71fa5510843bce02eb4163a304cb44dab300d0f2781aa5278
-
Filesize
15KB
MD56242e3d67787ccbf4e06ad2982853144
SHA16ac7947207d999a65890ab25fe344955da35028e
SHA2564ca10dba7ff487fdb3f1362a3681d7d929f5aa1262cdfd31b04c30826983fb1d
SHA5127d0d457e1537d624119a8023bcc086575696a5739c0460ef11554afac13af5e5d1edc7629a10e62834aba9f1b3ab1442011b15b4c3930399d91dca34b3b1cbaf
-
Filesize
15KB
MD56242e3d67787ccbf4e06ad2982853144
SHA16ac7947207d999a65890ab25fe344955da35028e
SHA2564ca10dba7ff487fdb3f1362a3681d7d929f5aa1262cdfd31b04c30826983fb1d
SHA5127d0d457e1537d624119a8023bcc086575696a5739c0460ef11554afac13af5e5d1edc7629a10e62834aba9f1b3ab1442011b15b4c3930399d91dca34b3b1cbaf
-
Filesize
92KB
MD5d3bf8fe7fba2d10fad92c68e560b32d0
SHA1522697148022edf42b3af93eaf5fe1f68b861f2b
SHA25693bb1953c15e5f20add86719f9fdd66c5a09ea91ff9519943d00f2eb9e93c753
SHA512ad1eb14cfdadb72824d829c57bac11a454d12bb612e133ebb207f955d686503f7af9425aafb1fbb2f2952e7ccba928033b7cec5ced33d9219b01477bb6ba9941
-
Filesize
92KB
MD5d3bf8fe7fba2d10fad92c68e560b32d0
SHA1522697148022edf42b3af93eaf5fe1f68b861f2b
SHA25693bb1953c15e5f20add86719f9fdd66c5a09ea91ff9519943d00f2eb9e93c753
SHA512ad1eb14cfdadb72824d829c57bac11a454d12bb612e133ebb207f955d686503f7af9425aafb1fbb2f2952e7ccba928033b7cec5ced33d9219b01477bb6ba9941
-
Filesize
168KB
MD5383db24a1d77b788edde0191979d8020
SHA10efaf6a9b7222ed5a0f2791f6348fa394825240a
SHA256bff5be807e0f93510e6c01b70dad0f87fa1a9aaf11413c910b0b9172b33e6acd
SHA512e9c661750f109b74659e6bb78f8fa9f4b32eea463b389269d834d8b0c7f18366656148ee3f6936ffeb282a0ae476ac3e286f6f6a37593fb386cf7d85dac58a63
-
Filesize
168KB
MD5383db24a1d77b788edde0191979d8020
SHA10efaf6a9b7222ed5a0f2791f6348fa394825240a
SHA256bff5be807e0f93510e6c01b70dad0f87fa1a9aaf11413c910b0b9172b33e6acd
SHA512e9c661750f109b74659e6bb78f8fa9f4b32eea463b389269d834d8b0c7f18366656148ee3f6936ffeb282a0ae476ac3e286f6f6a37593fb386cf7d85dac58a63
-
Filesize
154B
MD5a78c78de6a78ea1480ccd04f4f898b91
SHA1d7d772438228bc7de16222aa50386b0353c5f0b4
SHA25683e51c8d51941c6a548f35eb6695b89766b44ffee12363cb39116debc50fcac2
SHA5127066cbf577d01c63f705341edb94fb326ea0645217710a1e84a75a8b7fd9713f44c118da639482df0b19891d4191bd9b4ce3e4ca53a8df5ec43e07cbabb3dc39
-
Filesize
76KB
MD594bdcafbd584c979b385adee14b08ab4
SHA11985a9d34271cd24d28c15452c822bd4b9b50f90
SHA256cb1822a981e9821d571af16b7e37beba5feb8e3dedcdd0461119af9aac0358b3
SHA51286382a441958d0e0135977891b99a4884496882b01aba8c18fba29e8b0827cfb2c17d5bca7f3b915d6c68f3da11a309f169bbdb009bb04bdf28a1093b78029ef
-
Filesize
76KB
MD594bdcafbd584c979b385adee14b08ab4
SHA11985a9d34271cd24d28c15452c822bd4b9b50f90
SHA256cb1822a981e9821d571af16b7e37beba5feb8e3dedcdd0461119af9aac0358b3
SHA51286382a441958d0e0135977891b99a4884496882b01aba8c18fba29e8b0827cfb2c17d5bca7f3b915d6c68f3da11a309f169bbdb009bb04bdf28a1093b78029ef