Analysis
-
max time kernel
158s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2023, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.391fc5c2039f6d351b0d6c5d5cc02ab5.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.391fc5c2039f6d351b0d6c5d5cc02ab5.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.391fc5c2039f6d351b0d6c5d5cc02ab5.exe
-
Size
30KB
-
MD5
391fc5c2039f6d351b0d6c5d5cc02ab5
-
SHA1
7c0b90c9a637a9dc85070bd87ee42930d607ec8d
-
SHA256
adbd7e37e0b5d0933ec5a058b17bbd6ec0373c2f5b1a3414c07f2c4062a4b391
-
SHA512
6e509dc0ff5295671e14ccba555dd56f2964ef7eb0141ecf960de216646fea5339b359b80164a92b498da52d8ed78ee3b754dc0dc8b33f0badcc70785633b228
-
SSDEEP
768:qZL/0F24lercjO4sTZg5ZLvn2IuWZ0kqRRNPWQHY:OLsF2Kerc64sTiX2IV0DsT
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation WINWORD.exe Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation NEAS.391fc5c2039f6d351b0d6c5d5cc02ab5.exe -
Executes dropped EXE 2 IoCs
pid Process 3796 WINWORD.exe 3924 WINWORD.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WINWORD = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\WINWORD.exe -r" WINWORD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 3 IoCs
pid Process 1016 PING.EXE 5036 PING.EXE 2432 PING.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4448 wrote to memory of 3796 4448 NEAS.391fc5c2039f6d351b0d6c5d5cc02ab5.exe 90 PID 4448 wrote to memory of 3796 4448 NEAS.391fc5c2039f6d351b0d6c5d5cc02ab5.exe 90 PID 4448 wrote to memory of 3796 4448 NEAS.391fc5c2039f6d351b0d6c5d5cc02ab5.exe 90 PID 3796 wrote to memory of 1164 3796 WINWORD.exe 91 PID 3796 wrote to memory of 1164 3796 WINWORD.exe 91 PID 3796 wrote to memory of 1164 3796 WINWORD.exe 91 PID 1164 wrote to memory of 2432 1164 cmd.exe 94 PID 1164 wrote to memory of 2432 1164 cmd.exe 94 PID 1164 wrote to memory of 2432 1164 cmd.exe 94 PID 1164 wrote to memory of 1016 1164 cmd.exe 95 PID 1164 wrote to memory of 1016 1164 cmd.exe 95 PID 1164 wrote to memory of 1016 1164 cmd.exe 95 PID 1164 wrote to memory of 5036 1164 cmd.exe 96 PID 1164 wrote to memory of 5036 1164 cmd.exe 96 PID 1164 wrote to memory of 5036 1164 cmd.exe 96 PID 1164 wrote to memory of 3924 1164 cmd.exe 98 PID 1164 wrote to memory of 3924 1164 cmd.exe 98 PID 1164 wrote to memory of 3924 1164 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.391fc5c2039f6d351b0d6c5d5cc02ab5.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.391fc5c2039f6d351b0d6c5d5cc02ab5.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe"C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe" -r2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 2&del "C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe"&ping 127.0.0.1 -n 2&rename "C:\Users\Admin\AppData\Roaming\Mozilla\000036F9" WINWORD.exe&ping 127.0.0.1 -n 2&"C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe" \r3⤵
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:2432
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:1016
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:5036
-
-
C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe"C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe" \r4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3924
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD57d4a872f1397c51f01af398c62c0f057
SHA13967d0059a049ae991b5dd1462c3ffac9480b698
SHA256b1ca6234c900edb2f1991fb6ea10973178b216dc5e091cfda3e1f905a5bd1f64
SHA51238111cb7b81117d4578ee352e113220b8014ad470b8521cad9733b62cba94298830ebc2664499d630baf4f27b257e047cf192e8d8d8d176523674151d1ab6e1d
-
Filesize
30KB
MD5391fc5c2039f6d351b0d6c5d5cc02ab5
SHA17c0b90c9a637a9dc85070bd87ee42930d607ec8d
SHA256adbd7e37e0b5d0933ec5a058b17bbd6ec0373c2f5b1a3414c07f2c4062a4b391
SHA5126e509dc0ff5295671e14ccba555dd56f2964ef7eb0141ecf960de216646fea5339b359b80164a92b498da52d8ed78ee3b754dc0dc8b33f0badcc70785633b228
-
Filesize
30KB
MD5391fc5c2039f6d351b0d6c5d5cc02ab5
SHA17c0b90c9a637a9dc85070bd87ee42930d607ec8d
SHA256adbd7e37e0b5d0933ec5a058b17bbd6ec0373c2f5b1a3414c07f2c4062a4b391
SHA5126e509dc0ff5295671e14ccba555dd56f2964ef7eb0141ecf960de216646fea5339b359b80164a92b498da52d8ed78ee3b754dc0dc8b33f0badcc70785633b228
-
Filesize
30KB
MD5391fc5c2039f6d351b0d6c5d5cc02ab5
SHA17c0b90c9a637a9dc85070bd87ee42930d607ec8d
SHA256adbd7e37e0b5d0933ec5a058b17bbd6ec0373c2f5b1a3414c07f2c4062a4b391
SHA5126e509dc0ff5295671e14ccba555dd56f2964ef7eb0141ecf960de216646fea5339b359b80164a92b498da52d8ed78ee3b754dc0dc8b33f0badcc70785633b228
-
Filesize
30KB
MD57d4a872f1397c51f01af398c62c0f057
SHA13967d0059a049ae991b5dd1462c3ffac9480b698
SHA256b1ca6234c900edb2f1991fb6ea10973178b216dc5e091cfda3e1f905a5bd1f64
SHA51238111cb7b81117d4578ee352e113220b8014ad470b8521cad9733b62cba94298830ebc2664499d630baf4f27b257e047cf192e8d8d8d176523674151d1ab6e1d