Analysis
-
max time kernel
143s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2023 04:38
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.c25323c99ac8d16a73f33eadc8fe66a0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.c25323c99ac8d16a73f33eadc8fe66a0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.c25323c99ac8d16a73f33eadc8fe66a0.exe
-
Size
224KB
-
MD5
c25323c99ac8d16a73f33eadc8fe66a0
-
SHA1
a79c20ab303e9b59f2f14bccfff9f44929087fdd
-
SHA256
2da702e6666e772a5aa0bceddc7152489c0b676846d3c8bbd085d3e1795b1f3b
-
SHA512
66addaa69eb9eed89b31df73cf9364d5d206f4050736a1993af57a741424a1ed79906bfac42c0af3f858ba16aa7c888c1de6ddefeb309f9c1ecfb97a231cc8e8
-
SSDEEP
3072:vVHgCc4xGvbwcU9KQ2BBAHmaPxsSVoKb5Eo:mCc4xGxWKQ2BonxsG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation NEAS.c25323c99ac8d16a73f33eadc8fe66a0.exe -
Executes dropped EXE 1 IoCs
pid Process 3448 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\835920b2\jusched.exe NEAS.c25323c99ac8d16a73f33eadc8fe66a0.exe File created C:\Program Files (x86)\835920b2\835920b2 NEAS.c25323c99ac8d16a73f33eadc8fe66a0.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job NEAS.c25323c99ac8d16a73f33eadc8fe66a0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3444 wrote to memory of 3448 3444 NEAS.c25323c99ac8d16a73f33eadc8fe66a0.exe 90 PID 3444 wrote to memory of 3448 3444 NEAS.c25323c99ac8d16a73f33eadc8fe66a0.exe 90 PID 3444 wrote to memory of 3448 3444 NEAS.c25323c99ac8d16a73f33eadc8fe66a0.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.c25323c99ac8d16a73f33eadc8fe66a0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.c25323c99ac8d16a73f33eadc8fe66a0.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Program Files (x86)\835920b2\jusched.exe"C:\Program Files (x86)\835920b2\jusched.exe"2⤵
- Executes dropped EXE
PID:3448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD5134c1d489094d6d3399f65b0e9aebc1f
SHA1612a57fbe6ed3ab9c15b39451171d813314a28d5
SHA25654f9150d1268f7b4b83dd9fc3ec32274bf749715a5806ff3ca5262f5427d6781
SHA512b09bf60e4850d05261d81a124a647dd111f42480224eae8a3bd2f64736c38119953703f868ad34194a7ae6dad6aabff4081ba73df262bbe9f5327867c56a48ed
-
Filesize
224KB
MD56c89391dd05280f968d801df79bacd04
SHA1bc753ed143e058cb56fb5366f6aa6b84a9f31f92
SHA25610545ce83176a299ef655f6327494b808ed88d3ae4fc88f1150ddf25393c76b8
SHA512c4ec63b56666774e908500569ad812ca2a72ead47172fe8d46d5f34c1c1bac29eeaa7a7271d8c5ea4f8480e75be328596cc90b3aeb9b68890ac1752de8067c56
-
Filesize
224KB
MD56c89391dd05280f968d801df79bacd04
SHA1bc753ed143e058cb56fb5366f6aa6b84a9f31f92
SHA25610545ce83176a299ef655f6327494b808ed88d3ae4fc88f1150ddf25393c76b8
SHA512c4ec63b56666774e908500569ad812ca2a72ead47172fe8d46d5f34c1c1bac29eeaa7a7271d8c5ea4f8480e75be328596cc90b3aeb9b68890ac1752de8067c56
-
Filesize
224KB
MD56c89391dd05280f968d801df79bacd04
SHA1bc753ed143e058cb56fb5366f6aa6b84a9f31f92
SHA25610545ce83176a299ef655f6327494b808ed88d3ae4fc88f1150ddf25393c76b8
SHA512c4ec63b56666774e908500569ad812ca2a72ead47172fe8d46d5f34c1c1bac29eeaa7a7271d8c5ea4f8480e75be328596cc90b3aeb9b68890ac1752de8067c56