Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2023 06:24
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.407ca4732539013ae98994b627eb5e80.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.407ca4732539013ae98994b627eb5e80.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.407ca4732539013ae98994b627eb5e80.exe
-
Size
21KB
-
MD5
407ca4732539013ae98994b627eb5e80
-
SHA1
2d72987b63fe1d4796c65f8495a12490c351d916
-
SHA256
4c6fa086139c5f012985a94409755cde407f57a5d868ae47a81aa5acec3123ad
-
SHA512
b0411ed98dab2cd1f47b57fd173216791ebd8937500428cf8c31405284d4091ab7161dfa50c8a504cf3f6ada30fe6d7474097cf5d5679b4a7037824b8bb1eae3
-
SSDEEP
384:QLcTQvmFzKbE+QwuC6WREiHQqYBkUn/8yIYNMBAfG0+9rwyunNc+ZYjd:QqQmFL+QMC9B1QYuA5IrbunNZY5
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation NEAS.407ca4732539013ae98994b627eb5e80.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation fcbnaf.exe -
Executes dropped EXE 1 IoCs
pid Process 4156 fcbnaf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4704 wrote to memory of 4156 4704 NEAS.407ca4732539013ae98994b627eb5e80.exe 88 PID 4704 wrote to memory of 4156 4704 NEAS.407ca4732539013ae98994b627eb5e80.exe 88 PID 4704 wrote to memory of 4156 4704 NEAS.407ca4732539013ae98994b627eb5e80.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.407ca4732539013ae98994b627eb5e80.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.407ca4732539013ae98994b627eb5e80.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\fcbnaf.exe"C:\Users\Admin\AppData\Local\Temp\fcbnaf.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:4156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD518f8454e89c7664b8014e613f11a25cd
SHA153363986df7cb977199281ec09b3d01a60b500ca
SHA25692b035e166f5fed433cccdcbf0bfcc8ea41dd0e06d6cedc6826db101fa4eadec
SHA5122c7d2b9af114d6f6770c8b82b19fceee4a64a30106a53cf72cda9bfb207214370ec26a490f5fe324f98d826f99d39713bb1c60b5bf55038616cea988fc8d1482
-
Filesize
21KB
MD518f8454e89c7664b8014e613f11a25cd
SHA153363986df7cb977199281ec09b3d01a60b500ca
SHA25692b035e166f5fed433cccdcbf0bfcc8ea41dd0e06d6cedc6826db101fa4eadec
SHA5122c7d2b9af114d6f6770c8b82b19fceee4a64a30106a53cf72cda9bfb207214370ec26a490f5fe324f98d826f99d39713bb1c60b5bf55038616cea988fc8d1482
-
Filesize
21KB
MD518f8454e89c7664b8014e613f11a25cd
SHA153363986df7cb977199281ec09b3d01a60b500ca
SHA25692b035e166f5fed433cccdcbf0bfcc8ea41dd0e06d6cedc6826db101fa4eadec
SHA5122c7d2b9af114d6f6770c8b82b19fceee4a64a30106a53cf72cda9bfb207214370ec26a490f5fe324f98d826f99d39713bb1c60b5bf55038616cea988fc8d1482