Analysis

  • max time kernel
    137s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/11/2023, 15:08

General

  • Target

    NEAS.ca8029e375b0d26696cd9d69a4951435_JC.exe

  • Size

    92KB

  • MD5

    ca8029e375b0d26696cd9d69a4951435

  • SHA1

    bfa1ab7f12a735c54582191cc86deae3358aa757

  • SHA256

    ee23562bd896227ae0349b413bb1fe7369bae901200d8144cea55f92683e50f1

  • SHA512

    05c2bfa17a4b35e72a1a3d9c99e81835156be8a855f6436ecc1c9fc62c5cb662de739c170965cd3725317207bf9f72f5ee23d1575eb4884ebc5afd44355905c1

  • SSDEEP

    1536:D7fPGykbOqjoHm4pICdfkLtAfupcWX50MxFY+yIOlnToIfzxy4OM:fq6+ouCpk2mpcWJ0r+QNTBfzX

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.ca8029e375b0d26696cd9d69a4951435_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.ca8029e375b0d26696cd9d69a4951435_JC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4956
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\E08C.tmp\E08D.tmp\E08E.bat C:\Users\Admin\AppData\Local\Temp\NEAS.ca8029e375b0d26696cd9d69a4951435_JC.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1464
      • C:\Windows\system32\iexpress.exe
        iexpress /n /q /m C:\Users\Admin\AppData\Local\Temp\hid.sed
        3⤵
          PID:336

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\E08C.tmp\E08D.tmp\E08E.bat

            Filesize

            1KB

            MD5

            da9a8db30b2193eb306fd377ddc09822

            SHA1

            2b14a8683d1faca6bd607d0ae398cb95c36ab6f5

            SHA256

            9a36afba88e927c8bb2a67791db72d7575c9b89639e7b5e265b49b965d1fa34f

            SHA512

            2055ae22207643f89e211db4272a7c8ef559535f8c5566098cceb0f05eaddf1f0a9e93f94b38885e10b715abae17ae33855b8dbbcc19a3c3db9aecda51ca5cfc

          • C:\Users\Admin\AppData\Local\Temp\hid.sed

            Filesize

            92KB

            MD5

            6b4e9b963946d108b82647f9a40d84e8

            SHA1

            e541a9f448da1df2b87dc8cbde8bb30c4efb196e

            SHA256

            e33a4985fc0420fe66f2037994b42581901473d1ecbbf45f4ed9a1b016b8ec99

            SHA512

            967e9d4f8a3e67d3e81635274cea09e86045ecd0f45d54d1dc72568f188fbed281d82032fabb69f372a18bf7953dae1b6e762ff49afccb136e0537841a74b8c9