Analysis

  • max time kernel
    140s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/11/2023, 06:08

General

  • Target

    NEAS.a96fff1caa1ee21afadeb6bbd67aeb40.exe

  • Size

    288KB

  • MD5

    a96fff1caa1ee21afadeb6bbd67aeb40

  • SHA1

    4d1e75aeadd8371b661b1521c02e72c459208f67

  • SHA256

    f57e9a56307b50adf39f37957ede4d13ef50ac92dae033dbabc5829f4de14560

  • SHA512

    868a7567d6eec47b8b8ebac36b9732149194afa14a88e4d4a3b878d3b35dea695fb8bac4951f618579bdcdd5951ed3e79a1d79eb3b8b729c763ec9b7ee84f096

  • SSDEEP

    6144:yQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:yQMyfmNFHfnWfhLZVHmOog

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.a96fff1caa1ee21afadeb6bbd67aeb40.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.a96fff1caa1ee21afadeb6bbd67aeb40.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    PID:3844
    • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:872
  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe
    "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe"
    1⤵
    • Executes dropped EXE
    PID:4024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe

    Filesize

    288KB

    MD5

    298f97070c0d6bb8ac172c97405e0249

    SHA1

    51ee148f5a8cd3cbd7af62053583eb7090b2752a

    SHA256

    5bbbefd777da142438cd30b72b21e39168bc532484c3634bb2da4a1e90cb1c22

    SHA512

    00d1888a9fa727e2d0f26bf1297ddebf70e5174ceac2bc5bfc29082c3705e38f1c42efe056a7f4cae3053b9962f80481f0c49f6ca76d20079f193b23913408bf

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe

    Filesize

    288KB

    MD5

    298f97070c0d6bb8ac172c97405e0249

    SHA1

    51ee148f5a8cd3cbd7af62053583eb7090b2752a

    SHA256

    5bbbefd777da142438cd30b72b21e39168bc532484c3634bb2da4a1e90cb1c22

    SHA512

    00d1888a9fa727e2d0f26bf1297ddebf70e5174ceac2bc5bfc29082c3705e38f1c42efe056a7f4cae3053b9962f80481f0c49f6ca76d20079f193b23913408bf

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe

    Filesize

    288KB

    MD5

    298f97070c0d6bb8ac172c97405e0249

    SHA1

    51ee148f5a8cd3cbd7af62053583eb7090b2752a

    SHA256

    5bbbefd777da142438cd30b72b21e39168bc532484c3634bb2da4a1e90cb1c22

    SHA512

    00d1888a9fa727e2d0f26bf1297ddebf70e5174ceac2bc5bfc29082c3705e38f1c42efe056a7f4cae3053b9962f80481f0c49f6ca76d20079f193b23913408bf

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe

    Filesize

    288KB

    MD5

    298f97070c0d6bb8ac172c97405e0249

    SHA1

    51ee148f5a8cd3cbd7af62053583eb7090b2752a

    SHA256

    5bbbefd777da142438cd30b72b21e39168bc532484c3634bb2da4a1e90cb1c22

    SHA512

    00d1888a9fa727e2d0f26bf1297ddebf70e5174ceac2bc5bfc29082c3705e38f1c42efe056a7f4cae3053b9962f80481f0c49f6ca76d20079f193b23913408bf