Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2023, 05:57
Behavioral task
behavioral1
Sample
NEAS.faa0567709678cbd4466cc42ea682d20.exe
Resource
win7-20231020-en
General
-
Target
NEAS.faa0567709678cbd4466cc42ea682d20.exe
-
Size
474KB
-
MD5
faa0567709678cbd4466cc42ea682d20
-
SHA1
5b978ba0e293e4ef3d2ad100fb5e977c74ff2159
-
SHA256
4583b9eb705f7688ab247833d11cda0547dbecdbd5648950818989dba23f6717
-
SHA512
04babb20f313f821edb18c689bf1ff85c9a46b412b72f9b3c443d6340e4ff72a1fce2249252e3ad971afa1d8d6c4e0dde3f72e0020d287f3cba9273a3025b5ce
-
SSDEEP
12288:MrKQUXfDqcDib2vqYzGp53ncgqmy0VFHJw:MuQcGbOJKpVncgu
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation NEAS.faa0567709678cbd4466cc42ea682d20.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation revua.exe -
Executes dropped EXE 2 IoCs
pid Process 5072 revua.exe 1996 lucio.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe 1996 lucio.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3308 wrote to memory of 5072 3308 NEAS.faa0567709678cbd4466cc42ea682d20.exe 93 PID 3308 wrote to memory of 5072 3308 NEAS.faa0567709678cbd4466cc42ea682d20.exe 93 PID 3308 wrote to memory of 5072 3308 NEAS.faa0567709678cbd4466cc42ea682d20.exe 93 PID 3308 wrote to memory of 4780 3308 NEAS.faa0567709678cbd4466cc42ea682d20.exe 95 PID 3308 wrote to memory of 4780 3308 NEAS.faa0567709678cbd4466cc42ea682d20.exe 95 PID 3308 wrote to memory of 4780 3308 NEAS.faa0567709678cbd4466cc42ea682d20.exe 95 PID 5072 wrote to memory of 1996 5072 revua.exe 105 PID 5072 wrote to memory of 1996 5072 revua.exe 105 PID 5072 wrote to memory of 1996 5072 revua.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.faa0567709678cbd4466cc42ea682d20.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.faa0567709678cbd4466cc42ea682d20.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\revua.exe"C:\Users\Admin\AppData\Local\Temp\revua.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\lucio.exe"C:\Users\Admin\AppData\Local\Temp\lucio.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵PID:4780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
286B
MD52fa21b4dd1c3fb6a111fa9d7c79490c5
SHA1e15c858b782fffa328fd85cf26054d29280002b2
SHA256231b132eda58ac11020600a323bc2782810ab2821bf3ba8307653636cca29e2a
SHA512b2f10d61137cf00497eec50b3357cac38f3eb0aa88e33172814439b9ef3b66a5fa3cdfae02a093c830c66f39fec8bd94a8f88e3ad53334b1acc3787fe7d664d9
-
Filesize
512B
MD58f99ee7272dd1407113f396fe5a8898f
SHA1f7b16930fcf441e055dbb5d1151cf14069a8169c
SHA256b5d9b43a15a15d53fc75b7f7383b774d14dcdf51ae51401bbbedfbbea2f00e53
SHA51260f9a9bd5964bf3eb23c947d8348c25add089917e4b6e21d128332f2b1feb3f1d0738c5fb5dc62b585dd1d4bfe22968e31ce8cb6231e039f0ebc62a270859855
-
Filesize
223KB
MD548a1b4b432ca71b212b0020eb16ce6c9
SHA14c2b50ed16875994b9c55149c437c035c65f3466
SHA256989d2bd8f01b83ad3f79261d3af53eef3632ada13ad48c145e82802208dc29fb
SHA512f0b27d04decc526d75ec99c0125023b00e40a118648d636630f8d4cff22bad34661c8f6f6079dff4a6115787a440a9261e5fba09fd5528684bbcbd65c7c2c90c
-
Filesize
223KB
MD548a1b4b432ca71b212b0020eb16ce6c9
SHA14c2b50ed16875994b9c55149c437c035c65f3466
SHA256989d2bd8f01b83ad3f79261d3af53eef3632ada13ad48c145e82802208dc29fb
SHA512f0b27d04decc526d75ec99c0125023b00e40a118648d636630f8d4cff22bad34661c8f6f6079dff4a6115787a440a9261e5fba09fd5528684bbcbd65c7c2c90c
-
Filesize
223KB
MD548a1b4b432ca71b212b0020eb16ce6c9
SHA14c2b50ed16875994b9c55149c437c035c65f3466
SHA256989d2bd8f01b83ad3f79261d3af53eef3632ada13ad48c145e82802208dc29fb
SHA512f0b27d04decc526d75ec99c0125023b00e40a118648d636630f8d4cff22bad34661c8f6f6079dff4a6115787a440a9261e5fba09fd5528684bbcbd65c7c2c90c
-
Filesize
474KB
MD5f79a32ef2e4e0aafbcaa0125b80977af
SHA19708c2e7e454015c7b3985ff5d1ffe276b126dba
SHA256048f06587dd3e9f36e4c6b9a4621628be0c115bde81b895f33b1a2cf6a0c7051
SHA5129644885ec2b3786feb17fc4236b4df4691712752954fd889286179e01c4bc74bd866ec62797f986b64bc2176cce49573fd89f972eeb4f5cd14b13f7295fd9fbf
-
Filesize
474KB
MD5f79a32ef2e4e0aafbcaa0125b80977af
SHA19708c2e7e454015c7b3985ff5d1ffe276b126dba
SHA256048f06587dd3e9f36e4c6b9a4621628be0c115bde81b895f33b1a2cf6a0c7051
SHA5129644885ec2b3786feb17fc4236b4df4691712752954fd889286179e01c4bc74bd866ec62797f986b64bc2176cce49573fd89f972eeb4f5cd14b13f7295fd9fbf
-
Filesize
474KB
MD5f79a32ef2e4e0aafbcaa0125b80977af
SHA19708c2e7e454015c7b3985ff5d1ffe276b126dba
SHA256048f06587dd3e9f36e4c6b9a4621628be0c115bde81b895f33b1a2cf6a0c7051
SHA5129644885ec2b3786feb17fc4236b4df4691712752954fd889286179e01c4bc74bd866ec62797f986b64bc2176cce49573fd89f972eeb4f5cd14b13f7295fd9fbf