Analysis

  • max time kernel
    57s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-11-2023 01:56

General

  • Target

    NEAS.e18f2ef0dad4026996dcdad9bc453d80.exe

  • Size

    192KB

  • MD5

    e18f2ef0dad4026996dcdad9bc453d80

  • SHA1

    742acc4cbc8699fe3d40ee5baec84358649048b0

  • SHA256

    f570d306f31da017163d9a2e70340ce1856eb7e18e29dfb4c9597f8860c41de8

  • SHA512

    dfaa6134ba8109bc2ece47ea776726109552868f9365f21c613e4a513e62761581c257f2ffd5a1e38b7395cc8a1b5e8a6aeaf208c26fd772a08540fa60d0e116

  • SSDEEP

    1536:XvVQb4cLIkN+4Weat2RKLjWlC48Pp9JAcjVSrowND57S:XvVQLIkLWeaA8KlCph9crowNs

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.e18f2ef0dad4026996dcdad9bc453d80.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.e18f2ef0dad4026996dcdad9bc453d80.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4468
    • C:\Program Files (x86)\e3ce37af\jusched.exe
      "C:\Program Files (x86)\e3ce37af\jusched.exe"
      2⤵
      • Executes dropped EXE
      PID:1792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\e3ce37af\e3ce37af

    Filesize

    17B

    MD5

    7bdf61d37c9adf3e1c6937107016091f

    SHA1

    56b8e0c454f9dd16d508a04b3afa7e458453ac41

    SHA256

    4c57d86c256214baa0a5a3322ef5cdd575210455b7e964ad60382bd9d4be12e0

    SHA512

    ff4fc1a427c84f47042375749f45ee6edea73b902ae977f14243ebceb7b9a28f41fe5dd404e3ea381754d9122202bc6b61ed0152b20a1c1be76c225dd20861d1

  • C:\Program Files (x86)\e3ce37af\jusched.exe

    Filesize

    192KB

    MD5

    705f77b710596354d20b3acec0ac2cea

    SHA1

    ed9e8acfad45fcf5942bc6914619de491c8de1c9

    SHA256

    2c3988facd1fe7f589f16a0a3efc26a9c9f596712829cc710e7dd5931fd44986

    SHA512

    17c7c68c6fe60fa548bab21ef9f91a2aeef10ed073b9247ca9cd456762d1903fd4b066c05606eac5aeff9b20ca01d6e64f82361f747e5d3633136178df912728

  • C:\Program Files (x86)\e3ce37af\jusched.exe

    Filesize

    192KB

    MD5

    705f77b710596354d20b3acec0ac2cea

    SHA1

    ed9e8acfad45fcf5942bc6914619de491c8de1c9

    SHA256

    2c3988facd1fe7f589f16a0a3efc26a9c9f596712829cc710e7dd5931fd44986

    SHA512

    17c7c68c6fe60fa548bab21ef9f91a2aeef10ed073b9247ca9cd456762d1903fd4b066c05606eac5aeff9b20ca01d6e64f82361f747e5d3633136178df912728

  • C:\Program Files (x86)\e3ce37af\jusched.exe

    Filesize

    192KB

    MD5

    705f77b710596354d20b3acec0ac2cea

    SHA1

    ed9e8acfad45fcf5942bc6914619de491c8de1c9

    SHA256

    2c3988facd1fe7f589f16a0a3efc26a9c9f596712829cc710e7dd5931fd44986

    SHA512

    17c7c68c6fe60fa548bab21ef9f91a2aeef10ed073b9247ca9cd456762d1903fd4b066c05606eac5aeff9b20ca01d6e64f82361f747e5d3633136178df912728

  • memory/1792-14-0x0000000000400000-0x00000000004CA000-memory.dmp

    Filesize

    808KB

  • memory/4468-0-0x0000000000400000-0x00000000004CA000-memory.dmp

    Filesize

    808KB

  • memory/4468-15-0x0000000000400000-0x00000000004CA000-memory.dmp

    Filesize

    808KB