Analysis
-
max time kernel
136s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
12/11/2023, 21:07
Behavioral task
behavioral1
Sample
NEAS.7990192978d6d12758dfb064ee907dd0.exe
Resource
win7-20231023-en
General
-
Target
NEAS.7990192978d6d12758dfb064ee907dd0.exe
-
Size
468KB
-
MD5
7990192978d6d12758dfb064ee907dd0
-
SHA1
e11140a099cafa757f013194e37d2e26ee6ff136
-
SHA256
1a005f4f95d254e2b01094bbfa1175e7509289f96106789f609708847f8a11a3
-
SHA512
f7ef89f8c7f64c78044d32e390280cc1baeff448cc73d6e1792821defe46d645a8bc55e9ea7692e11a314a5ddfe776d162e6a1607d01247e65ab62d1a77f19d0
-
SSDEEP
12288:93CtSokfFGUMKwlTIU/b37dJ75WEe+eKTxB6mX:9x9GzHlTv/b35tecFB6G
Malware Config
Extracted
urelas
121.88.5.183
121.88.5.184
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation NEAS.7990192978d6d12758dfb064ee907dd0.exe -
Executes dropped EXE 1 IoCs
pid Process 3496 sander.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1536 wrote to memory of 3496 1536 NEAS.7990192978d6d12758dfb064ee907dd0.exe 91 PID 1536 wrote to memory of 3496 1536 NEAS.7990192978d6d12758dfb064ee907dd0.exe 91 PID 1536 wrote to memory of 3496 1536 NEAS.7990192978d6d12758dfb064ee907dd0.exe 91 PID 1536 wrote to memory of 3896 1536 NEAS.7990192978d6d12758dfb064ee907dd0.exe 92 PID 1536 wrote to memory of 3896 1536 NEAS.7990192978d6d12758dfb064ee907dd0.exe 92 PID 1536 wrote to memory of 3896 1536 NEAS.7990192978d6d12758dfb064ee907dd0.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.7990192978d6d12758dfb064ee907dd0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.7990192978d6d12758dfb064ee907dd0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\sander.exe"C:\Users\Admin\AppData\Local\Temp\sander.exe"2⤵
- Executes dropped EXE
PID:3496
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_sannuyex.bat" "2⤵PID:3896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
287B
MD5a63a771b572610f5fc33b29181b1f923
SHA1c5545787db151289486152fdd54b73ebd528fb85
SHA256303da82cb9eec7b8ad84d8e41c9602f2935e3a2c8b85b4726f1e19d587c55ea5
SHA512c7387425ca2a62bc7c21f6524447e450ab7a6242c17132a26937fb74570c4775cfe52113fb7203cbcf58dfb557e62e870389c1769d1f899e0e5e1cf4f9d9299a
-
Filesize
512B
MD5145cec05d8d704ff7aa3d812b1aff628
SHA1097ae09965ed3804359803708b8af87b5b90fcbb
SHA25666c8ae290d7cf992faf67b10d1ef8ad91857f3709f459af69b6a11f521a3aeea
SHA5121037d7926aec2831c8b084cc19aa38ce91bc8dcff15af731ce0e7cea79fa7806d4d341a9535c39b0ccb8d6f19bc2badf6d20d3b4ab1c931cd5be6994c4323b9d
-
Filesize
468KB
MD5011b2897857855affcfa2f69c191aaa2
SHA130c32f0a53125b6c78d5f104a023af330ee5b190
SHA2565ec0271dd918bd7faccbf2384a3808736800fcc4e0db01392b0df5035819e8b9
SHA51281882ffb60a94ccbdacd0a8c99e8c166fdefb13db0c52df0d9901fa361f2382577091bdc66734dbd66e72ad3a8ec478bd00933cd0cea786f676ac780e0551836
-
Filesize
468KB
MD5011b2897857855affcfa2f69c191aaa2
SHA130c32f0a53125b6c78d5f104a023af330ee5b190
SHA2565ec0271dd918bd7faccbf2384a3808736800fcc4e0db01392b0df5035819e8b9
SHA51281882ffb60a94ccbdacd0a8c99e8c166fdefb13db0c52df0d9901fa361f2382577091bdc66734dbd66e72ad3a8ec478bd00933cd0cea786f676ac780e0551836
-
Filesize
468KB
MD5011b2897857855affcfa2f69c191aaa2
SHA130c32f0a53125b6c78d5f104a023af330ee5b190
SHA2565ec0271dd918bd7faccbf2384a3808736800fcc4e0db01392b0df5035819e8b9
SHA51281882ffb60a94ccbdacd0a8c99e8c166fdefb13db0c52df0d9901fa361f2382577091bdc66734dbd66e72ad3a8ec478bd00933cd0cea786f676ac780e0551836