Analysis

  • max time kernel
    121s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/11/2023, 18:34

General

  • Target

    NEAS.93b85904ee44f0fb32002dabd8fc944262f57ca7fe62dc8c2a86fcddd7c5d7d5.exe

  • Size

    80KB

  • MD5

    f95789c092ce9f252857875c242f33d6

  • SHA1

    ce6db0c9f829a7101825ef36c1e40f9e6047e829

  • SHA256

    93b85904ee44f0fb32002dabd8fc944262f57ca7fe62dc8c2a86fcddd7c5d7d5

  • SHA512

    97c132dcdb73b8057a9cf806bdec28f98241ece9d4eba314feb9c6f9aa8c9df908892083dbd75f32de205cfffcdae65a98613410ed49fa56dff7ef16d49a924c

  • SSDEEP

    1536:lqjyXN0ly65p6wGYFEEDxSV7SRYnQm4dcslN4ZJjeSVtSWwnouy8jS:w+Xe58wGYFxDxSQpdcslNANV2outjS

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.93b85904ee44f0fb32002dabd8fc944262f57ca7fe62dc8c2a86fcddd7c5d7d5.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.93b85904ee44f0fb32002dabd8fc944262f57ca7fe62dc8c2a86fcddd7c5d7d5.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Windows\SysWOW64\ipconfig.exe
      "C:\Windows\System32\ipconfig.exe" /release
      2⤵
      • Gathers network information
      PID:2928
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1512 -s 928
      2⤵
      • Program crash
      PID:4868
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1512 -ip 1512
    1⤵
      PID:2164

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1512-0-0x0000000000400000-0x000000000044D000-memory.dmp

            Filesize

            308KB

          • memory/1512-3-0x0000000000400000-0x000000000044D000-memory.dmp

            Filesize

            308KB

          • memory/1512-15-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-13-0x0000000000400000-0x000000000044D000-memory.dmp

            Filesize

            308KB

          • memory/1512-16-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-18-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-20-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-23-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-24-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-27-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-29-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-31-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-34-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-35-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-37-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-36-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-38-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-39-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-40-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-42-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-41-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-43-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-44-0x0000000000400000-0x000000000044D000-memory.dmp

            Filesize

            308KB

          • memory/1512-48-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-49-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-50-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-51-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-52-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-53-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-54-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-55-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-58-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-59-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-57-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-60-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-61-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-62-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/1512-64-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB