Analysis

  • max time kernel
    143s
  • max time network
    207s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2023 04:38

General

  • Target

    NEAS.c25323c99ac8d16a73f33eadc8fe66a0.exe

  • Size

    224KB

  • MD5

    c25323c99ac8d16a73f33eadc8fe66a0

  • SHA1

    a79c20ab303e9b59f2f14bccfff9f44929087fdd

  • SHA256

    2da702e6666e772a5aa0bceddc7152489c0b676846d3c8bbd085d3e1795b1f3b

  • SHA512

    66addaa69eb9eed89b31df73cf9364d5d206f4050736a1993af57a741424a1ed79906bfac42c0af3f858ba16aa7c888c1de6ddefeb309f9c1ecfb97a231cc8e8

  • SSDEEP

    3072:vVHgCc4xGvbwcU9KQ2BBAHmaPxsSVoKb5Eo:mCc4xGxWKQ2BonxsG

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.c25323c99ac8d16a73f33eadc8fe66a0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.c25323c99ac8d16a73f33eadc8fe66a0.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3444
    • C:\Program Files (x86)\835920b2\jusched.exe
      "C:\Program Files (x86)\835920b2\jusched.exe"
      2⤵
      • Executes dropped EXE
      PID:3448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\835920b2\835920b2

    Filesize

    17B

    MD5

    134c1d489094d6d3399f65b0e9aebc1f

    SHA1

    612a57fbe6ed3ab9c15b39451171d813314a28d5

    SHA256

    54f9150d1268f7b4b83dd9fc3ec32274bf749715a5806ff3ca5262f5427d6781

    SHA512

    b09bf60e4850d05261d81a124a647dd111f42480224eae8a3bd2f64736c38119953703f868ad34194a7ae6dad6aabff4081ba73df262bbe9f5327867c56a48ed

  • C:\Program Files (x86)\835920b2\jusched.exe

    Filesize

    224KB

    MD5

    6c89391dd05280f968d801df79bacd04

    SHA1

    bc753ed143e058cb56fb5366f6aa6b84a9f31f92

    SHA256

    10545ce83176a299ef655f6327494b808ed88d3ae4fc88f1150ddf25393c76b8

    SHA512

    c4ec63b56666774e908500569ad812ca2a72ead47172fe8d46d5f34c1c1bac29eeaa7a7271d8c5ea4f8480e75be328596cc90b3aeb9b68890ac1752de8067c56

  • C:\Program Files (x86)\835920b2\jusched.exe

    Filesize

    224KB

    MD5

    6c89391dd05280f968d801df79bacd04

    SHA1

    bc753ed143e058cb56fb5366f6aa6b84a9f31f92

    SHA256

    10545ce83176a299ef655f6327494b808ed88d3ae4fc88f1150ddf25393c76b8

    SHA512

    c4ec63b56666774e908500569ad812ca2a72ead47172fe8d46d5f34c1c1bac29eeaa7a7271d8c5ea4f8480e75be328596cc90b3aeb9b68890ac1752de8067c56

  • C:\Program Files (x86)\835920b2\jusched.exe

    Filesize

    224KB

    MD5

    6c89391dd05280f968d801df79bacd04

    SHA1

    bc753ed143e058cb56fb5366f6aa6b84a9f31f92

    SHA256

    10545ce83176a299ef655f6327494b808ed88d3ae4fc88f1150ddf25393c76b8

    SHA512

    c4ec63b56666774e908500569ad812ca2a72ead47172fe8d46d5f34c1c1bac29eeaa7a7271d8c5ea4f8480e75be328596cc90b3aeb9b68890ac1752de8067c56

  • memory/3444-0-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/3444-13-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/3444-16-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/3448-15-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB