Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2023 03:34
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.6d13441dbcc0eb39c8579143bf1b23e0.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.6d13441dbcc0eb39c8579143bf1b23e0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.6d13441dbcc0eb39c8579143bf1b23e0.exe
-
Size
168KB
-
MD5
6d13441dbcc0eb39c8579143bf1b23e0
-
SHA1
e33af0fa2a43383e80ef9f273456ed6877263151
-
SHA256
d7a1ea2715823fc0b0e060d5d70d3452336ebd3cec732502c4751bc853acbeec
-
SHA512
7c8f6d262506d44b3f5d292db116a8ad84f9745092a1a35e47c0a84487f0e8ecfbab4961ff5bb180227e2dd458bbfe1d4b5dddec29efac423c28db84d541ddf3
-
SSDEEP
3072:4XTTASJKf2n5AxE2NpxOa2XdU2QF4s5XgIDFyHb8kHofL/09rG:4vASJKenie2xT2NU2OTFQb8Fb0I
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation NEAS.6d13441dbcc0eb39c8579143bf1b23e0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelPowerAgent0 = "rundll32.exe shell32.dll, ShellExec_RunDLL C:\\PROGRA~3\\2J6FJH~1.EXE" svchost.exe -
Checks for any installed AV software in registry 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avira svchost.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast svchost.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Eset\Nod svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3120 set thread context of 1856 3120 NEAS.6d13441dbcc0eb39c8579143bf1b23e0.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3120 wrote to memory of 1856 3120 NEAS.6d13441dbcc0eb39c8579143bf1b23e0.exe 86 PID 3120 wrote to memory of 1856 3120 NEAS.6d13441dbcc0eb39c8579143bf1b23e0.exe 86 PID 3120 wrote to memory of 1856 3120 NEAS.6d13441dbcc0eb39c8579143bf1b23e0.exe 86 PID 3120 wrote to memory of 1856 3120 NEAS.6d13441dbcc0eb39c8579143bf1b23e0.exe 86 PID 3120 wrote to memory of 1856 3120 NEAS.6d13441dbcc0eb39c8579143bf1b23e0.exe 86 PID 3120 wrote to memory of 1856 3120 NEAS.6d13441dbcc0eb39c8579143bf1b23e0.exe 86 PID 3120 wrote to memory of 1856 3120 NEAS.6d13441dbcc0eb39c8579143bf1b23e0.exe 86 PID 3120 wrote to memory of 1856 3120 NEAS.6d13441dbcc0eb39c8579143bf1b23e0.exe 86 PID 3120 wrote to memory of 1856 3120 NEAS.6d13441dbcc0eb39c8579143bf1b23e0.exe 86 PID 3120 wrote to memory of 1856 3120 NEAS.6d13441dbcc0eb39c8579143bf1b23e0.exe 86 PID 3120 wrote to memory of 1856 3120 NEAS.6d13441dbcc0eb39c8579143bf1b23e0.exe 86 PID 3120 wrote to memory of 1588 3120 NEAS.6d13441dbcc0eb39c8579143bf1b23e0.exe 87 PID 3120 wrote to memory of 1588 3120 NEAS.6d13441dbcc0eb39c8579143bf1b23e0.exe 87 PID 3120 wrote to memory of 1588 3120 NEAS.6d13441dbcc0eb39c8579143bf1b23e0.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6d13441dbcc0eb39c8579143bf1b23e0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6d13441dbcc0eb39c8579143bf1b23e0.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\svchost.exeC:\ProgramData\2j6fjh00jb.exe2⤵
- Adds Run key to start application
- Checks for any installed AV software in registry
- Suspicious behavior: EnumeratesProcesses
PID:1856
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\oci68C9.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\NEAS.6d13441dbcc0eb39c8579143bf1b23e0.exe""2⤵PID:1588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD529adefa9a0bac2ec84acc7745823b267
SHA1f0510b05fb7591d64f9e919aed4e6ca087314b5f
SHA256e5c0536c493f9595ecccd935d05dbabca79edc2cf0798080ad37390e8598d3ee
SHA5125525965c6bf4ca9cd357947376c1e9bb9f6a803f9c62c1612a6fdbe1c8baa310bbce7341ec7820312329f145555d1eaf77586ac0149fef7963cac0b20f6c16ab