Analysis

  • max time kernel
    136s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2023, 17:34

General

  • Target

    NEAS.5e75c30d8f1a6b4b8b2f22fbebe97e60.exe

  • Size

    1.9MB

  • MD5

    5e75c30d8f1a6b4b8b2f22fbebe97e60

  • SHA1

    1db43da8554ecf3844e7315583e4fbb34ffec1a5

  • SHA256

    d8c5d0486e1ae534c8683e6b62f05a39575f8be1ce00fc77106faa2cff50edd4

  • SHA512

    929be7efdfe2547dd0b049203d75b7e0848bfba9f2e8a58aa207052e5a8b9b581a6828673de6307b397402a0264e32b36d3c530518d6c45a87a5fff6b9dd1808

  • SSDEEP

    49152:R5TsuDpbTChxKCnFnQXBbrtgb/iQvu0UHO+8:R5g8p6hxvWbrtUTrUHOb

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.5e75c30d8f1a6b4b8b2f22fbebe97e60.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.5e75c30d8f1a6b4b8b2f22fbebe97e60.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4012
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3884
      • C:\Users\Admin\AppData\Local\Temp\@AE90F0.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\@AE90F0.tmp.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3312
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4132
          • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4312
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3940
              • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe" /i 4312
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:3660
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat" "
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:844
                  • C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                    "C:\Users\Admin\AppData\Local\Temp\wtmps.exe"
                    9⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Suspicious use of WriteProcessMemory
                    PID:1456
                    • C:\Windows\SysWOW64\mscaps.exe
                      "C:\Windows\system32\mscaps.exe" /C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                      10⤵
                      • Executes dropped EXE
                      PID:1056
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
          4⤵
            PID:4780
        • C:\Users\Admin\AppData\Local\Temp\NEAS.5e75c30d8f1a6b4b8b2f22fbebe97e60.exe
          "C:\Users\Admin\AppData\Local\Temp\NEAS.5e75c30d8f1a6b4b8b2f22fbebe97e60.exe"
          3⤵
          • Executes dropped EXE
          PID:3580

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\8CE4.tmp

            Filesize

            406B

            MD5

            37512bcc96b2c0c0cf0ad1ed8cfae5cd

            SHA1

            edf7f17ce28e1c4c82207cab8ca77f2056ea545c

            SHA256

            27e678bf5dc82219d6edd744f0b82567a26e40f8a9dcd6487205e13058e3ed1f

            SHA512

            6d4252ab5aa441a76ce2127224fefcb221259ab4d39f06437b269bd6bfdaae009c8f34e9603ec734159553bc9f1359bdd70316cd426d73b171a9f17c41077641

          • C:\Users\Admin\AppData\Local\Temp\@AE90F0.tmp.exe

            Filesize

            1.7MB

            MD5

            d20dcf262863c05ad056109cf11d519e

            SHA1

            53187a0495ef6ebc52df6c2931e0a672d5885942

            SHA256

            b96d9b86fe70c856eb778c4ffdda367873886b5b034f1e6536413b222489936a

            SHA512

            372e182aa4bb6a13c4b3969eb04faa38e3c534877951bc45cdcecb8386e018949c8b684fd55e8ab7e0e2bf96df2fa5c144dfcaf363dc30c4bdd2074c8c3707b3

          • C:\Users\Admin\AppData\Local\Temp\@AE90F0.tmp.exe

            Filesize

            1.7MB

            MD5

            d20dcf262863c05ad056109cf11d519e

            SHA1

            53187a0495ef6ebc52df6c2931e0a672d5885942

            SHA256

            b96d9b86fe70c856eb778c4ffdda367873886b5b034f1e6536413b222489936a

            SHA512

            372e182aa4bb6a13c4b3969eb04faa38e3c534877951bc45cdcecb8386e018949c8b684fd55e8ab7e0e2bf96df2fa5c144dfcaf363dc30c4bdd2074c8c3707b3

          • C:\Users\Admin\AppData\Local\Temp\@AE90F0.tmp.exe

            Filesize

            1.7MB

            MD5

            d20dcf262863c05ad056109cf11d519e

            SHA1

            53187a0495ef6ebc52df6c2931e0a672d5885942

            SHA256

            b96d9b86fe70c856eb778c4ffdda367873886b5b034f1e6536413b222489936a

            SHA512

            372e182aa4bb6a13c4b3969eb04faa38e3c534877951bc45cdcecb8386e018949c8b684fd55e8ab7e0e2bf96df2fa5c144dfcaf363dc30c4bdd2074c8c3707b3

          • C:\Users\Admin\AppData\Local\Temp\NEAS.5e75c30d8f1a6b4b8b2f22fbebe97e60.exe

            Filesize

            152KB

            MD5

            fa6d90c2050d82b63831ab3941898aea

            SHA1

            863c8cd4bc3ba73d6b3a314e6cac25c90b1ef59b

            SHA256

            c494e2cc2811a35be720c332eb682aa24ba1c753b5e647846a72e4e8dad2cff7

            SHA512

            fd5ac77a2185f463e6c693ef0a8fba4c380a52b731c190d680f5bee43ee5c709d29262b124525e7c9b81ebeb1c44b342e52468ed30c164eb425ad5557e0776da

          • C:\Users\Admin\AppData\Local\Temp\NEAS.5e75c30d8f1a6b4b8b2f22fbebe97e60.exe

            Filesize

            152KB

            MD5

            fa6d90c2050d82b63831ab3941898aea

            SHA1

            863c8cd4bc3ba73d6b3a314e6cac25c90b1ef59b

            SHA256

            c494e2cc2811a35be720c332eb682aa24ba1c753b5e647846a72e4e8dad2cff7

            SHA512

            fd5ac77a2185f463e6c693ef0a8fba4c380a52b731c190d680f5bee43ee5c709d29262b124525e7c9b81ebeb1c44b342e52468ed30c164eb425ad5557e0776da

          • C:\Users\Admin\AppData\Local\Temp\tmp48AA.tmp

            Filesize

            120KB

            MD5

            f558c76b0376af9273717fa24d99ebbf

            SHA1

            f84bcece5c6138b62ef94e9d668cf26178ee14cc

            SHA256

            01631353726dc51bcea311dbc012572cf96775e516b1c79a2de572ef15954b7a

            SHA512

            2092d1e126d0420fec5fc0311d6b99762506563f4890e4049e48e2d87dde5ac3e2e2ecc986ab305de2c6ceb619f18879a69a815d3241ccf8140bc5ea00c6768d

          • C:\Users\Admin\AppData\Local\Temp\tmp48CA.tmp

            Filesize

            126KB

            MD5

            8be246f888e928684973e118322c4847

            SHA1

            3cba529d4dbabf4f6c30c76cef8451b51e617b65

            SHA256

            2f3e760bbc21add68378076c3bc7cfc91be5749fb77ea75ba8f81afdd5322672

            SHA512

            9453497676cafc61f34206b6e0186d3fef1d0b7bdb46bcc8bc061d710fa01ef47d14f3650005b9061c0f6963bddf33ecde110d54ab6229b2fc0cc136dbd676f5

          • C:\Users\Admin\AppData\Local\Temp\tmp48FC.tmp

            Filesize

            172KB

            MD5

            2634fa3a332c297711cb59d43f54ffce

            SHA1

            8e2b68d0ee4e792efb1945ba86eceb87f07087d2

            SHA256

            27c945ccb84aa024f1f063701327e829a7ef3a7ede4a43b2febbb1dddbdf8740

            SHA512

            84e4799b9b18a7cc7be685c793a9b4fb135ea331d1d235fe823e1d7091130f131ab2fbad1da4dea795e82547aa16b00f4e2a9faaa96cb522d795f9abfda2fc53

          • C:\Users\Admin\AppData\Local\Temp\tmp491C.tmp

            Filesize

            276KB

            MD5

            e07c6a9e595f045fadc463dfda44ab16

            SHA1

            e6b199272ade02613f2003c365a4cb1487431e23

            SHA256

            d2fa6f9686386a92253a9c5ea25ace702a111483540b60c1300789235cea7fdc

            SHA512

            f3c630ae8381b99519aeeadbc2918810e7fb09a909f73ee6c46f4e9d3cf8c5051a5cf763db6a775d6cd8713ccf95a63b18df9ed756fa28276e8d7ab6a47f2cbf

          • C:\Users\Admin\AppData\Local\Temp\wtmps.exe

            Filesize

            276KB

            MD5

            75c1467042b38332d1ea0298f29fb592

            SHA1

            f92ea770c2ddb04cf0d20914578e4c482328f0f8

            SHA256

            3b20c853d4ca23240cd338b8cab16f1027c540ddfe9c4ffdca1624d2f923b373

            SHA512

            5c47c59ad222e2597ccdf2c100853c48f022e933f44c279154346eacf9e7e6f54214ada541d43a10424035f160b56131aab206c11512a9fd6ea614fbd3160aa0

          • C:\Users\Admin\AppData\Local\Temp\wtmps.exe

            Filesize

            276KB

            MD5

            75c1467042b38332d1ea0298f29fb592

            SHA1

            f92ea770c2ddb04cf0d20914578e4c482328f0f8

            SHA256

            3b20c853d4ca23240cd338b8cab16f1027c540ddfe9c4ffdca1624d2f923b373

            SHA512

            5c47c59ad222e2597ccdf2c100853c48f022e933f44c279154346eacf9e7e6f54214ada541d43a10424035f160b56131aab206c11512a9fd6ea614fbd3160aa0

          • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe

            Filesize

            172KB

            MD5

            daac1781c9d22f5743ade0cb41feaebf

            SHA1

            e2549eeeea42a6892b89d354498fcaa8ffd9cac4

            SHA256

            6a7093440420306cf7de53421a67af8a1094771e0aab9535acbd748d08ed766c

            SHA512

            190a7d5291e20002f996edf1e04456bfdff8b7b2f4ef113178bd42a9e5fd89fe6d410ae2c505de0358c4f53f9654ac1caaa8634665afa6d9691640dd4ee86160

          • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe

            Filesize

            172KB

            MD5

            daac1781c9d22f5743ade0cb41feaebf

            SHA1

            e2549eeeea42a6892b89d354498fcaa8ffd9cac4

            SHA256

            6a7093440420306cf7de53421a67af8a1094771e0aab9535acbd748d08ed766c

            SHA512

            190a7d5291e20002f996edf1e04456bfdff8b7b2f4ef113178bd42a9e5fd89fe6d410ae2c505de0358c4f53f9654ac1caaa8634665afa6d9691640dd4ee86160

          • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe

            Filesize

            1.7MB

            MD5

            37e51d9c237283c5bf912e2c3aa79473

            SHA1

            46eb8f3d50d2913cc40d34133ce1089b552431f5

            SHA256

            4c8a46192d46821a6c286eac514e68d353d3db19d74d2811f4caf01c28c4a660

            SHA512

            54902a5a939b4cdab3befdd5a88368ef874162511b4956a2cddbe3167838cb023b3a2d7979028f39d8e05285c446c0dba3c2d485a368841b73f9113c295eb599

          • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe

            Filesize

            1.7MB

            MD5

            37e51d9c237283c5bf912e2c3aa79473

            SHA1

            46eb8f3d50d2913cc40d34133ce1089b552431f5

            SHA256

            4c8a46192d46821a6c286eac514e68d353d3db19d74d2811f4caf01c28c4a660

            SHA512

            54902a5a939b4cdab3befdd5a88368ef874162511b4956a2cddbe3167838cb023b3a2d7979028f39d8e05285c446c0dba3c2d485a368841b73f9113c295eb599

          • C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat

            Filesize

            129B

            MD5

            d1073c9b34d1bbd570928734aacff6a5

            SHA1

            78714e24e88d50e0da8da9d303bec65b2ee6d903

            SHA256

            b3c704b1a728004fc5e25899d72930a7466d7628dd6ddd795b3000897dfa4020

            SHA512

            4f2b9330e30fcc55245dc5d12311e105b2b2b9d607fbfc4a203c69a740006f0af58d6a01e2da284575a897528da71a2e61a7321034755b78feb646c8dd12347f

          • C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat

            Filesize

            102B

            MD5

            1d68f046cd6a9197038fb2445d2bea05

            SHA1

            d8dca54cfa0b2ad404bce32d5d94634bcfc9b2d7

            SHA256

            9cddd4b2ac719f01052deef3aa558fbfbcd21d5728215651345c3d2b9ba250d9

            SHA512

            2720d071fd02b2cf0d9f1de8dd19117fd128f213dd7f66fa8adb00d7873a5de58d2f2618100d28eec85db707d9e34d20258f9a1f76acf75fe668e66722e1cc4c

          • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

            Filesize

            126B

            MD5

            126e76078918fe97f2095fea5a3085d7

            SHA1

            3b857fa936517272727bb0df4b7bbe3fdb4e8c08

            SHA256

            cfe79bf10a3a3e2c9c0ea8a9337263c845d52c97ab264a23f439eb7db4340e92

            SHA512

            dba359050745afc7325d2eb3b43badde373b2a83bf4ad2be694917b301887a69915d16506cc627e444978919dff63fb8f0e63a833f28ffedfbe793137ca434af

          • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

            Filesize

            196B

            MD5

            9ae209f14ff87bf6f448512699d94afb

            SHA1

            0b3159450ec22c8d17e622dafeb54fd2cdaf8f52

            SHA256

            3e5a7d7bbe25d007c08dbcfc1fae09aff90113b51d51332d8b1314cec11d696f

            SHA512

            487b2020563fa05a69c1c9fa69fe6993fdac8126163b0155c6cecc3538204403a627df3cb4b3344ee34bf51d4d0b45417df8e85c89a52f813ec0b5c4dce1447b

          • C:\Users\Admin\AppData\Roaming\Temp\mydll.dll

            Filesize

            388KB

            MD5

            8d7db101a7211fe3309dc4dc8cf2dd0a

            SHA1

            6c2781eadf53b3742d16dab2f164baf813f7ac85

            SHA256

            93db7c9699594caa19490280842fbebec3877278c92128b92e63d75fcd01397a

            SHA512

            8b139d447068519997f7bbc2c7c2fe3846b89ae1fba847258277c9ab92a93583b28fae7ffa444768929ed5852cc914c0270446cbf0bd20aca49bde6b6f809c83

          • C:\Users\Admin\AppData\Roaming\Temp\mydll.dll

            Filesize

            388KB

            MD5

            8d7db101a7211fe3309dc4dc8cf2dd0a

            SHA1

            6c2781eadf53b3742d16dab2f164baf813f7ac85

            SHA256

            93db7c9699594caa19490280842fbebec3877278c92128b92e63d75fcd01397a

            SHA512

            8b139d447068519997f7bbc2c7c2fe3846b89ae1fba847258277c9ab92a93583b28fae7ffa444768929ed5852cc914c0270446cbf0bd20aca49bde6b6f809c83

          • C:\Users\Admin\AppData\Roaming\Temp\mydll.dll

            Filesize

            388KB

            MD5

            8d7db101a7211fe3309dc4dc8cf2dd0a

            SHA1

            6c2781eadf53b3742d16dab2f164baf813f7ac85

            SHA256

            93db7c9699594caa19490280842fbebec3877278c92128b92e63d75fcd01397a

            SHA512

            8b139d447068519997f7bbc2c7c2fe3846b89ae1fba847258277c9ab92a93583b28fae7ffa444768929ed5852cc914c0270446cbf0bd20aca49bde6b6f809c83

          • C:\Windows\SysWOW64\mscaps.exe

            Filesize

            200KB

            MD5

            78d3c8705f8baf7d34e6a6737d1cfa18

            SHA1

            9f09e248a29311dbeefae9d85937b13da042a010

            SHA256

            2c4c9ec8e9291ba5c73f641af2e0c3e1bbd257ac40d9fb9d3faab7cebc978905

            SHA512

            9a3c3175276da58f1bc8d1138e63238c8d8ccfbfa1a8a1338e88525eca47f8d745158bb34396b7c3f25e4296be5f45a71781da33ad0bbdf7ad88a9c305b85609

          • C:\Windows\SysWOW64\mscaps.exe

            Filesize

            200KB

            MD5

            78d3c8705f8baf7d34e6a6737d1cfa18

            SHA1

            9f09e248a29311dbeefae9d85937b13da042a010

            SHA256

            2c4c9ec8e9291ba5c73f641af2e0c3e1bbd257ac40d9fb9d3faab7cebc978905

            SHA512

            9a3c3175276da58f1bc8d1138e63238c8d8ccfbfa1a8a1338e88525eca47f8d745158bb34396b7c3f25e4296be5f45a71781da33ad0bbdf7ad88a9c305b85609

          • memory/3312-22-0x0000000010000000-0x0000000010015000-memory.dmp

            Filesize

            84KB