Analysis
-
max time kernel
136s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2023, 17:34
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.5e75c30d8f1a6b4b8b2f22fbebe97e60.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.5e75c30d8f1a6b4b8b2f22fbebe97e60.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.5e75c30d8f1a6b4b8b2f22fbebe97e60.exe
-
Size
1.9MB
-
MD5
5e75c30d8f1a6b4b8b2f22fbebe97e60
-
SHA1
1db43da8554ecf3844e7315583e4fbb34ffec1a5
-
SHA256
d8c5d0486e1ae534c8683e6b62f05a39575f8be1ce00fc77106faa2cff50edd4
-
SHA512
929be7efdfe2547dd0b049203d75b7e0848bfba9f2e8a58aa207052e5a8b9b581a6828673de6307b397402a0264e32b36d3c530518d6c45a87a5fff6b9dd1808
-
SSDEEP
49152:R5TsuDpbTChxKCnFnQXBbrtgb/iQvu0UHO+8:R5g8p6hxvWbrtUTrUHOb
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation @AE90F0.tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation WdExt.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation launch.exe -
Executes dropped EXE 6 IoCs
pid Process 3312 @AE90F0.tmp.exe 3580 NEAS.5e75c30d8f1a6b4b8b2f22fbebe97e60.exe 4312 WdExt.exe 3660 launch.exe 1456 wtmps.exe 1056 mscaps.exe -
Loads dropped DLL 2 IoCs
pid Process 3312 @AE90F0.tmp.exe 4312 WdExt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Defender Extension = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Defender\\launch.exe\"" launch.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\mscaps.exe wtmps.exe File opened for modification C:\Windows\SysWOW64\mscaps.exe wtmps.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3312 @AE90F0.tmp.exe 3312 @AE90F0.tmp.exe 4312 WdExt.exe 4312 WdExt.exe 3660 launch.exe 3660 launch.exe 3660 launch.exe 3660 launch.exe 3660 launch.exe 3660 launch.exe 3660 launch.exe 3660 launch.exe 3660 launch.exe 3660 launch.exe 3660 launch.exe 3660 launch.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 4012 wrote to memory of 3884 4012 NEAS.5e75c30d8f1a6b4b8b2f22fbebe97e60.exe 91 PID 4012 wrote to memory of 3884 4012 NEAS.5e75c30d8f1a6b4b8b2f22fbebe97e60.exe 91 PID 4012 wrote to memory of 3884 4012 NEAS.5e75c30d8f1a6b4b8b2f22fbebe97e60.exe 91 PID 4012 wrote to memory of 3884 4012 NEAS.5e75c30d8f1a6b4b8b2f22fbebe97e60.exe 91 PID 4012 wrote to memory of 3884 4012 NEAS.5e75c30d8f1a6b4b8b2f22fbebe97e60.exe 91 PID 3884 wrote to memory of 3312 3884 explorer.exe 98 PID 3884 wrote to memory of 3312 3884 explorer.exe 98 PID 3884 wrote to memory of 3312 3884 explorer.exe 98 PID 3884 wrote to memory of 3580 3884 explorer.exe 99 PID 3884 wrote to memory of 3580 3884 explorer.exe 99 PID 3884 wrote to memory of 3580 3884 explorer.exe 99 PID 3312 wrote to memory of 4132 3312 @AE90F0.tmp.exe 106 PID 3312 wrote to memory of 4132 3312 @AE90F0.tmp.exe 106 PID 3312 wrote to memory of 4132 3312 @AE90F0.tmp.exe 106 PID 3312 wrote to memory of 4780 3312 @AE90F0.tmp.exe 107 PID 3312 wrote to memory of 4780 3312 @AE90F0.tmp.exe 107 PID 3312 wrote to memory of 4780 3312 @AE90F0.tmp.exe 107 PID 4132 wrote to memory of 4312 4132 cmd.exe 111 PID 4132 wrote to memory of 4312 4132 cmd.exe 111 PID 4132 wrote to memory of 4312 4132 cmd.exe 111 PID 4312 wrote to memory of 3940 4312 WdExt.exe 112 PID 4312 wrote to memory of 3940 4312 WdExt.exe 112 PID 4312 wrote to memory of 3940 4312 WdExt.exe 112 PID 3940 wrote to memory of 3660 3940 cmd.exe 114 PID 3940 wrote to memory of 3660 3940 cmd.exe 114 PID 3940 wrote to memory of 3660 3940 cmd.exe 114 PID 3660 wrote to memory of 844 3660 launch.exe 117 PID 3660 wrote to memory of 844 3660 launch.exe 117 PID 3660 wrote to memory of 844 3660 launch.exe 117 PID 844 wrote to memory of 1456 844 cmd.exe 119 PID 844 wrote to memory of 1456 844 cmd.exe 119 PID 844 wrote to memory of 1456 844 cmd.exe 119 PID 1456 wrote to memory of 1056 1456 wtmps.exe 121 PID 1456 wrote to memory of 1056 1456 wtmps.exe 121 PID 1456 wrote to memory of 1056 1456 wtmps.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5e75c30d8f1a6b4b8b2f22fbebe97e60.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5e75c30d8f1a6b4b8b2f22fbebe97e60.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\@AE90F0.tmp.exe"C:\Users\Admin\AppData\Local\Temp\@AE90F0.tmp.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe" /i 43127⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\wtmps.exe"C:\Users\Admin\AppData\Local\Temp\wtmps.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\mscaps.exe"C:\Windows\system32\mscaps.exe" /C:\Users\Admin\AppData\Local\Temp\wtmps.exe10⤵
- Executes dropped EXE
PID:1056
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "4⤵PID:4780
-
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5e75c30d8f1a6b4b8b2f22fbebe97e60.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5e75c30d8f1a6b4b8b2f22fbebe97e60.exe"3⤵
- Executes dropped EXE
PID:3580
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
406B
MD537512bcc96b2c0c0cf0ad1ed8cfae5cd
SHA1edf7f17ce28e1c4c82207cab8ca77f2056ea545c
SHA25627e678bf5dc82219d6edd744f0b82567a26e40f8a9dcd6487205e13058e3ed1f
SHA5126d4252ab5aa441a76ce2127224fefcb221259ab4d39f06437b269bd6bfdaae009c8f34e9603ec734159553bc9f1359bdd70316cd426d73b171a9f17c41077641
-
Filesize
1.7MB
MD5d20dcf262863c05ad056109cf11d519e
SHA153187a0495ef6ebc52df6c2931e0a672d5885942
SHA256b96d9b86fe70c856eb778c4ffdda367873886b5b034f1e6536413b222489936a
SHA512372e182aa4bb6a13c4b3969eb04faa38e3c534877951bc45cdcecb8386e018949c8b684fd55e8ab7e0e2bf96df2fa5c144dfcaf363dc30c4bdd2074c8c3707b3
-
Filesize
1.7MB
MD5d20dcf262863c05ad056109cf11d519e
SHA153187a0495ef6ebc52df6c2931e0a672d5885942
SHA256b96d9b86fe70c856eb778c4ffdda367873886b5b034f1e6536413b222489936a
SHA512372e182aa4bb6a13c4b3969eb04faa38e3c534877951bc45cdcecb8386e018949c8b684fd55e8ab7e0e2bf96df2fa5c144dfcaf363dc30c4bdd2074c8c3707b3
-
Filesize
1.7MB
MD5d20dcf262863c05ad056109cf11d519e
SHA153187a0495ef6ebc52df6c2931e0a672d5885942
SHA256b96d9b86fe70c856eb778c4ffdda367873886b5b034f1e6536413b222489936a
SHA512372e182aa4bb6a13c4b3969eb04faa38e3c534877951bc45cdcecb8386e018949c8b684fd55e8ab7e0e2bf96df2fa5c144dfcaf363dc30c4bdd2074c8c3707b3
-
Filesize
152KB
MD5fa6d90c2050d82b63831ab3941898aea
SHA1863c8cd4bc3ba73d6b3a314e6cac25c90b1ef59b
SHA256c494e2cc2811a35be720c332eb682aa24ba1c753b5e647846a72e4e8dad2cff7
SHA512fd5ac77a2185f463e6c693ef0a8fba4c380a52b731c190d680f5bee43ee5c709d29262b124525e7c9b81ebeb1c44b342e52468ed30c164eb425ad5557e0776da
-
Filesize
152KB
MD5fa6d90c2050d82b63831ab3941898aea
SHA1863c8cd4bc3ba73d6b3a314e6cac25c90b1ef59b
SHA256c494e2cc2811a35be720c332eb682aa24ba1c753b5e647846a72e4e8dad2cff7
SHA512fd5ac77a2185f463e6c693ef0a8fba4c380a52b731c190d680f5bee43ee5c709d29262b124525e7c9b81ebeb1c44b342e52468ed30c164eb425ad5557e0776da
-
Filesize
120KB
MD5f558c76b0376af9273717fa24d99ebbf
SHA1f84bcece5c6138b62ef94e9d668cf26178ee14cc
SHA25601631353726dc51bcea311dbc012572cf96775e516b1c79a2de572ef15954b7a
SHA5122092d1e126d0420fec5fc0311d6b99762506563f4890e4049e48e2d87dde5ac3e2e2ecc986ab305de2c6ceb619f18879a69a815d3241ccf8140bc5ea00c6768d
-
Filesize
126KB
MD58be246f888e928684973e118322c4847
SHA13cba529d4dbabf4f6c30c76cef8451b51e617b65
SHA2562f3e760bbc21add68378076c3bc7cfc91be5749fb77ea75ba8f81afdd5322672
SHA5129453497676cafc61f34206b6e0186d3fef1d0b7bdb46bcc8bc061d710fa01ef47d14f3650005b9061c0f6963bddf33ecde110d54ab6229b2fc0cc136dbd676f5
-
Filesize
172KB
MD52634fa3a332c297711cb59d43f54ffce
SHA18e2b68d0ee4e792efb1945ba86eceb87f07087d2
SHA25627c945ccb84aa024f1f063701327e829a7ef3a7ede4a43b2febbb1dddbdf8740
SHA51284e4799b9b18a7cc7be685c793a9b4fb135ea331d1d235fe823e1d7091130f131ab2fbad1da4dea795e82547aa16b00f4e2a9faaa96cb522d795f9abfda2fc53
-
Filesize
276KB
MD5e07c6a9e595f045fadc463dfda44ab16
SHA1e6b199272ade02613f2003c365a4cb1487431e23
SHA256d2fa6f9686386a92253a9c5ea25ace702a111483540b60c1300789235cea7fdc
SHA512f3c630ae8381b99519aeeadbc2918810e7fb09a909f73ee6c46f4e9d3cf8c5051a5cf763db6a775d6cd8713ccf95a63b18df9ed756fa28276e8d7ab6a47f2cbf
-
Filesize
276KB
MD575c1467042b38332d1ea0298f29fb592
SHA1f92ea770c2ddb04cf0d20914578e4c482328f0f8
SHA2563b20c853d4ca23240cd338b8cab16f1027c540ddfe9c4ffdca1624d2f923b373
SHA5125c47c59ad222e2597ccdf2c100853c48f022e933f44c279154346eacf9e7e6f54214ada541d43a10424035f160b56131aab206c11512a9fd6ea614fbd3160aa0
-
Filesize
276KB
MD575c1467042b38332d1ea0298f29fb592
SHA1f92ea770c2ddb04cf0d20914578e4c482328f0f8
SHA2563b20c853d4ca23240cd338b8cab16f1027c540ddfe9c4ffdca1624d2f923b373
SHA5125c47c59ad222e2597ccdf2c100853c48f022e933f44c279154346eacf9e7e6f54214ada541d43a10424035f160b56131aab206c11512a9fd6ea614fbd3160aa0
-
Filesize
172KB
MD5daac1781c9d22f5743ade0cb41feaebf
SHA1e2549eeeea42a6892b89d354498fcaa8ffd9cac4
SHA2566a7093440420306cf7de53421a67af8a1094771e0aab9535acbd748d08ed766c
SHA512190a7d5291e20002f996edf1e04456bfdff8b7b2f4ef113178bd42a9e5fd89fe6d410ae2c505de0358c4f53f9654ac1caaa8634665afa6d9691640dd4ee86160
-
Filesize
172KB
MD5daac1781c9d22f5743ade0cb41feaebf
SHA1e2549eeeea42a6892b89d354498fcaa8ffd9cac4
SHA2566a7093440420306cf7de53421a67af8a1094771e0aab9535acbd748d08ed766c
SHA512190a7d5291e20002f996edf1e04456bfdff8b7b2f4ef113178bd42a9e5fd89fe6d410ae2c505de0358c4f53f9654ac1caaa8634665afa6d9691640dd4ee86160
-
Filesize
1.7MB
MD537e51d9c237283c5bf912e2c3aa79473
SHA146eb8f3d50d2913cc40d34133ce1089b552431f5
SHA2564c8a46192d46821a6c286eac514e68d353d3db19d74d2811f4caf01c28c4a660
SHA51254902a5a939b4cdab3befdd5a88368ef874162511b4956a2cddbe3167838cb023b3a2d7979028f39d8e05285c446c0dba3c2d485a368841b73f9113c295eb599
-
Filesize
1.7MB
MD537e51d9c237283c5bf912e2c3aa79473
SHA146eb8f3d50d2913cc40d34133ce1089b552431f5
SHA2564c8a46192d46821a6c286eac514e68d353d3db19d74d2811f4caf01c28c4a660
SHA51254902a5a939b4cdab3befdd5a88368ef874162511b4956a2cddbe3167838cb023b3a2d7979028f39d8e05285c446c0dba3c2d485a368841b73f9113c295eb599
-
Filesize
129B
MD5d1073c9b34d1bbd570928734aacff6a5
SHA178714e24e88d50e0da8da9d303bec65b2ee6d903
SHA256b3c704b1a728004fc5e25899d72930a7466d7628dd6ddd795b3000897dfa4020
SHA5124f2b9330e30fcc55245dc5d12311e105b2b2b9d607fbfc4a203c69a740006f0af58d6a01e2da284575a897528da71a2e61a7321034755b78feb646c8dd12347f
-
Filesize
102B
MD51d68f046cd6a9197038fb2445d2bea05
SHA1d8dca54cfa0b2ad404bce32d5d94634bcfc9b2d7
SHA2569cddd4b2ac719f01052deef3aa558fbfbcd21d5728215651345c3d2b9ba250d9
SHA5122720d071fd02b2cf0d9f1de8dd19117fd128f213dd7f66fa8adb00d7873a5de58d2f2618100d28eec85db707d9e34d20258f9a1f76acf75fe668e66722e1cc4c
-
Filesize
126B
MD5126e76078918fe97f2095fea5a3085d7
SHA13b857fa936517272727bb0df4b7bbe3fdb4e8c08
SHA256cfe79bf10a3a3e2c9c0ea8a9337263c845d52c97ab264a23f439eb7db4340e92
SHA512dba359050745afc7325d2eb3b43badde373b2a83bf4ad2be694917b301887a69915d16506cc627e444978919dff63fb8f0e63a833f28ffedfbe793137ca434af
-
Filesize
196B
MD59ae209f14ff87bf6f448512699d94afb
SHA10b3159450ec22c8d17e622dafeb54fd2cdaf8f52
SHA2563e5a7d7bbe25d007c08dbcfc1fae09aff90113b51d51332d8b1314cec11d696f
SHA512487b2020563fa05a69c1c9fa69fe6993fdac8126163b0155c6cecc3538204403a627df3cb4b3344ee34bf51d4d0b45417df8e85c89a52f813ec0b5c4dce1447b
-
Filesize
388KB
MD58d7db101a7211fe3309dc4dc8cf2dd0a
SHA16c2781eadf53b3742d16dab2f164baf813f7ac85
SHA25693db7c9699594caa19490280842fbebec3877278c92128b92e63d75fcd01397a
SHA5128b139d447068519997f7bbc2c7c2fe3846b89ae1fba847258277c9ab92a93583b28fae7ffa444768929ed5852cc914c0270446cbf0bd20aca49bde6b6f809c83
-
Filesize
388KB
MD58d7db101a7211fe3309dc4dc8cf2dd0a
SHA16c2781eadf53b3742d16dab2f164baf813f7ac85
SHA25693db7c9699594caa19490280842fbebec3877278c92128b92e63d75fcd01397a
SHA5128b139d447068519997f7bbc2c7c2fe3846b89ae1fba847258277c9ab92a93583b28fae7ffa444768929ed5852cc914c0270446cbf0bd20aca49bde6b6f809c83
-
Filesize
388KB
MD58d7db101a7211fe3309dc4dc8cf2dd0a
SHA16c2781eadf53b3742d16dab2f164baf813f7ac85
SHA25693db7c9699594caa19490280842fbebec3877278c92128b92e63d75fcd01397a
SHA5128b139d447068519997f7bbc2c7c2fe3846b89ae1fba847258277c9ab92a93583b28fae7ffa444768929ed5852cc914c0270446cbf0bd20aca49bde6b6f809c83
-
Filesize
200KB
MD578d3c8705f8baf7d34e6a6737d1cfa18
SHA19f09e248a29311dbeefae9d85937b13da042a010
SHA2562c4c9ec8e9291ba5c73f641af2e0c3e1bbd257ac40d9fb9d3faab7cebc978905
SHA5129a3c3175276da58f1bc8d1138e63238c8d8ccfbfa1a8a1338e88525eca47f8d745158bb34396b7c3f25e4296be5f45a71781da33ad0bbdf7ad88a9c305b85609
-
Filesize
200KB
MD578d3c8705f8baf7d34e6a6737d1cfa18
SHA19f09e248a29311dbeefae9d85937b13da042a010
SHA2562c4c9ec8e9291ba5c73f641af2e0c3e1bbd257ac40d9fb9d3faab7cebc978905
SHA5129a3c3175276da58f1bc8d1138e63238c8d8ccfbfa1a8a1338e88525eca47f8d745158bb34396b7c3f25e4296be5f45a71781da33ad0bbdf7ad88a9c305b85609