Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2023 06:16
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0d7930d81211efd5eadd96802a8d01e0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.0d7930d81211efd5eadd96802a8d01e0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.0d7930d81211efd5eadd96802a8d01e0.exe
-
Size
472KB
-
MD5
0d7930d81211efd5eadd96802a8d01e0
-
SHA1
ac54d2753e0d5cd3d8dc7b8c1f41f58ffa65b2fa
-
SHA256
73d637debd43f39f191e41a8dfb330ab707177bb6f71d98aa9582b7f930adb4f
-
SHA512
b5b6f3fd86c512bbfa673e3aa07c58dcba4e650691744d797de77d6c4070971c1984fbe0386b693da85e749afd006ea526408aceb864101adb2aec4cff1e66d7
-
SSDEEP
6144:cf+Jjjou35J6i5plrzuo6/LkeYvjoIHnv0RX/VwFdLD/7MsrYMC+9GXL9M8sG3du:bj8u3ui5pl+uBvc/V0FdYxJdRqMy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation NEAS.0d7930d81211efd5eadd96802a8d01e0.exe Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation LSASS.exe -
Executes dropped EXE 2 IoCs
pid Process 1004 LSASS.exe 2056 LSASS.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: LSASS.exe File opened (read-only) \??\M: LSASS.exe File opened (read-only) \??\O: LSASS.exe File opened (read-only) \??\P: LSASS.exe File opened (read-only) \??\U: LSASS.exe File opened (read-only) \??\I: LSASS.exe File opened (read-only) \??\K: LSASS.exe File opened (read-only) \??\L: LSASS.exe File opened (read-only) \??\S: LSASS.exe File opened (read-only) \??\W: LSASS.exe File opened (read-only) \??\Y: LSASS.exe File opened (read-only) \??\G: LSASS.exe File opened (read-only) \??\J: LSASS.exe File opened (read-only) \??\N: LSASS.exe File opened (read-only) \??\R: LSASS.exe File opened (read-only) \??\V: LSASS.exe File opened (read-only) \??\H: LSASS.exe File opened (read-only) \??\Q: LSASS.exe File opened (read-only) \??\T: LSASS.exe File opened (read-only) \??\X: LSASS.exe File opened (read-only) \??\Z: LSASS.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf LSASS.exe File opened for modification C:\autorun.inf LSASS.exe File created F:\autorun.inf LSASS.exe File opened for modification F:\autorun.inf LSASS.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\LSASS.exe NEAS.0d7930d81211efd5eadd96802a8d01e0.exe File opened for modification C:\Windows\LSASS.exe NEAS.0d7930d81211efd5eadd96802a8d01e0.exe File opened for modification C:\Windows\LSASS.exe LSASS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ NEAS.0d7930d81211efd5eadd96802a8d01e0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ LSASS.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4748 NEAS.0d7930d81211efd5eadd96802a8d01e0.exe 4748 NEAS.0d7930d81211efd5eadd96802a8d01e0.exe 4748 NEAS.0d7930d81211efd5eadd96802a8d01e0.exe 4748 NEAS.0d7930d81211efd5eadd96802a8d01e0.exe 4748 NEAS.0d7930d81211efd5eadd96802a8d01e0.exe 4748 NEAS.0d7930d81211efd5eadd96802a8d01e0.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 2056 LSASS.exe 2056 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe 1004 LSASS.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4748 wrote to memory of 1004 4748 NEAS.0d7930d81211efd5eadd96802a8d01e0.exe 96 PID 4748 wrote to memory of 1004 4748 NEAS.0d7930d81211efd5eadd96802a8d01e0.exe 96 PID 4748 wrote to memory of 1004 4748 NEAS.0d7930d81211efd5eadd96802a8d01e0.exe 96 PID 1004 wrote to memory of 1820 1004 LSASS.exe 100 PID 1004 wrote to memory of 1820 1004 LSASS.exe 100 PID 1004 wrote to memory of 1820 1004 LSASS.exe 100 PID 1004 wrote to memory of 4644 1004 LSASS.exe 101 PID 1004 wrote to memory of 4644 1004 LSASS.exe 101 PID 1004 wrote to memory of 4644 1004 LSASS.exe 101 PID 1004 wrote to memory of 2056 1004 LSASS.exe 104 PID 1004 wrote to memory of 2056 1004 LSASS.exe 104 PID 1004 wrote to memory of 2056 1004 LSASS.exe 104 PID 1004 wrote to memory of 5088 1004 LSASS.exe 105 PID 1004 wrote to memory of 5088 1004 LSASS.exe 105 PID 1004 wrote to memory of 5088 1004 LSASS.exe 105 PID 1004 wrote to memory of 4428 1004 LSASS.exe 106 PID 1004 wrote to memory of 4428 1004 LSASS.exe 106 PID 1004 wrote to memory of 4428 1004 LSASS.exe 106 PID 1004 wrote to memory of 1368 1004 LSASS.exe 117 PID 1004 wrote to memory of 1368 1004 LSASS.exe 117 PID 1004 wrote to memory of 1368 1004 LSASS.exe 117 PID 1004 wrote to memory of 5092 1004 LSASS.exe 118 PID 1004 wrote to memory of 5092 1004 LSASS.exe 118 PID 1004 wrote to memory of 5092 1004 LSASS.exe 118 PID 1004 wrote to memory of 2816 1004 LSASS.exe 122 PID 1004 wrote to memory of 2816 1004 LSASS.exe 122 PID 1004 wrote to memory of 2816 1004 LSASS.exe 122 PID 1004 wrote to memory of 744 1004 LSASS.exe 123 PID 1004 wrote to memory of 744 1004 LSASS.exe 123 PID 1004 wrote to memory of 744 1004 LSASS.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.0d7930d81211efd5eadd96802a8d01e0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.0d7930d81211efd5eadd96802a8d01e0.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\LSASS.exe"C:\Windows\LSASS.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:1820
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:4644
-
-
C:\Users\Admin\LSASS.exe"C:\Users\Admin\LSASS.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2056
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:5088
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:4428
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:1368
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:5092
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:2816
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
472KB
MD564687c935f5202353fe7d1573a65ea7c
SHA11b5102fe0250ef6006b7d4d322484689a7d6f68c
SHA256f8ff870bb1f688b43a6f1a20c0e7cc6486e22e3800300680e4d89294798383d7
SHA512d7295b395f3db931da9c9197a6afafa851429195568788e4393431481273456ff40b592440283af5d30c14abcf15d85ac34dcb7c7fa0566bf2c31a763fd5348b
-
Filesize
472KB
MD564687c935f5202353fe7d1573a65ea7c
SHA11b5102fe0250ef6006b7d4d322484689a7d6f68c
SHA256f8ff870bb1f688b43a6f1a20c0e7cc6486e22e3800300680e4d89294798383d7
SHA512d7295b395f3db931da9c9197a6afafa851429195568788e4393431481273456ff40b592440283af5d30c14abcf15d85ac34dcb7c7fa0566bf2c31a763fd5348b
-
Filesize
472KB
MD583e2da4b5d72df7bc87b0054418599ad
SHA11b8fdff8f49868d33942493c5d745cc605e7caba
SHA256369fad7214257f5d45ef873400216fa14b8c66e8ba2a4bbf1527e4094caf058a
SHA5124b3e0a5af37911b03eaad683c82bebec894951f6adc609a07cc291103b7b0254834f8f50472efb8a4ff9752574516ef0dfcf4affa8787447c3d477726275144e
-
Filesize
472KB
MD583e2da4b5d72df7bc87b0054418599ad
SHA11b8fdff8f49868d33942493c5d745cc605e7caba
SHA256369fad7214257f5d45ef873400216fa14b8c66e8ba2a4bbf1527e4094caf058a
SHA5124b3e0a5af37911b03eaad683c82bebec894951f6adc609a07cc291103b7b0254834f8f50472efb8a4ff9752574516ef0dfcf4affa8787447c3d477726275144e
-
Filesize
472KB
MD583e2da4b5d72df7bc87b0054418599ad
SHA11b8fdff8f49868d33942493c5d745cc605e7caba
SHA256369fad7214257f5d45ef873400216fa14b8c66e8ba2a4bbf1527e4094caf058a
SHA5124b3e0a5af37911b03eaad683c82bebec894951f6adc609a07cc291103b7b0254834f8f50472efb8a4ff9752574516ef0dfcf4affa8787447c3d477726275144e
-
Filesize
190B
MD5b1445c7f646c6ca9a7597791af38d575
SHA191efaf63fa1f7a51ee2f9b1c3b0f8932f15439ce
SHA256220517d50470c86d94020cebcd03af286898e65338f468dc5f860dc04af2c88e
SHA512533349278b6d186f0f3947681e90dcc7f617e146736798e6fc23e79d61610f1f7b2e4b4241b296884622fbd6b1cf73dc694a852e05bf4235da8ed40b70c5683f