Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-11-2023 06:24

General

  • Target

    NEAS.407ca4732539013ae98994b627eb5e80.exe

  • Size

    21KB

  • MD5

    407ca4732539013ae98994b627eb5e80

  • SHA1

    2d72987b63fe1d4796c65f8495a12490c351d916

  • SHA256

    4c6fa086139c5f012985a94409755cde407f57a5d868ae47a81aa5acec3123ad

  • SHA512

    b0411ed98dab2cd1f47b57fd173216791ebd8937500428cf8c31405284d4091ab7161dfa50c8a504cf3f6ada30fe6d7474097cf5d5679b4a7037824b8bb1eae3

  • SSDEEP

    384:QLcTQvmFzKbE+QwuC6WREiHQqYBkUn/8yIYNMBAfG0+9rwyunNc+ZYjd:QqQmFL+QMC9B1QYuA5IrbunNZY5

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.407ca4732539013ae98994b627eb5e80.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.407ca4732539013ae98994b627eb5e80.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4704
    • C:\Users\Admin\AppData\Local\Temp\fcbnaf.exe
      "C:\Users\Admin\AppData\Local\Temp\fcbnaf.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:4156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\fcbnaf.exe

    Filesize

    21KB

    MD5

    18f8454e89c7664b8014e613f11a25cd

    SHA1

    53363986df7cb977199281ec09b3d01a60b500ca

    SHA256

    92b035e166f5fed433cccdcbf0bfcc8ea41dd0e06d6cedc6826db101fa4eadec

    SHA512

    2c7d2b9af114d6f6770c8b82b19fceee4a64a30106a53cf72cda9bfb207214370ec26a490f5fe324f98d826f99d39713bb1c60b5bf55038616cea988fc8d1482

  • C:\Users\Admin\AppData\Local\Temp\fcbnaf.exe

    Filesize

    21KB

    MD5

    18f8454e89c7664b8014e613f11a25cd

    SHA1

    53363986df7cb977199281ec09b3d01a60b500ca

    SHA256

    92b035e166f5fed433cccdcbf0bfcc8ea41dd0e06d6cedc6826db101fa4eadec

    SHA512

    2c7d2b9af114d6f6770c8b82b19fceee4a64a30106a53cf72cda9bfb207214370ec26a490f5fe324f98d826f99d39713bb1c60b5bf55038616cea988fc8d1482

  • C:\Users\Admin\AppData\Local\Temp\fcbnaf.exe

    Filesize

    21KB

    MD5

    18f8454e89c7664b8014e613f11a25cd

    SHA1

    53363986df7cb977199281ec09b3d01a60b500ca

    SHA256

    92b035e166f5fed433cccdcbf0bfcc8ea41dd0e06d6cedc6826db101fa4eadec

    SHA512

    2c7d2b9af114d6f6770c8b82b19fceee4a64a30106a53cf72cda9bfb207214370ec26a490f5fe324f98d826f99d39713bb1c60b5bf55038616cea988fc8d1482

  • memory/4156-9-0x0000000001510000-0x0000000001511000-memory.dmp

    Filesize

    4KB

  • memory/4704-0-0x0000000000E70000-0x0000000000E71000-memory.dmp

    Filesize

    4KB