Analysis
-
max time kernel
133s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 02:24
Behavioral task
behavioral1
Sample
505661cf2143ff9bcdd7cb7f387c0cd0_NEAS.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
505661cf2143ff9bcdd7cb7f387c0cd0_NEAS.exe
Resource
win10v2004-20240419-en
General
-
Target
505661cf2143ff9bcdd7cb7f387c0cd0_NEAS.exe
-
Size
92KB
-
MD5
505661cf2143ff9bcdd7cb7f387c0cd0
-
SHA1
309b267f70fd371195ba0150d2b7542fcdc84c70
-
SHA256
07ef5cdad470b7d7f1b90675b3050ed63148cc24dca01a2074cad94e78673e8b
-
SHA512
ca4aa30541ae77c7c3a500295e360e360d6952c364617a88f9d6b51ec2604c11307c92d606d879290a6a9d210a554e1f00a68f742e0d56718b815f685b9a76c7
-
SSDEEP
1536:R7M3BhP/E9y9f/zMGv/4P6bR1ik5J/lEuU0Ay2s+eHxCEtkz30rtrg:O3BN+IfRO6bRnlZAvHcxCEtg30Bc
Malware Config
Signatures
-
Sakula payload 1 IoCs
resource yara_rule behavioral2/files/0x000b000000023bba-2.dat family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation 505661cf2143ff9bcdd7cb7f387c0cd0_NEAS.exe -
Executes dropped EXE 1 IoCs
pid Process 1260 AdobeUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\AdobeUpdate.exe" 505661cf2143ff9bcdd7cb7f387c0cd0_NEAS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3436 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3620 505661cf2143ff9bcdd7cb7f387c0cd0_NEAS.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3620 wrote to memory of 1260 3620 505661cf2143ff9bcdd7cb7f387c0cd0_NEAS.exe 84 PID 3620 wrote to memory of 1260 3620 505661cf2143ff9bcdd7cb7f387c0cd0_NEAS.exe 84 PID 3620 wrote to memory of 1260 3620 505661cf2143ff9bcdd7cb7f387c0cd0_NEAS.exe 84 PID 3620 wrote to memory of 2496 3620 505661cf2143ff9bcdd7cb7f387c0cd0_NEAS.exe 98 PID 3620 wrote to memory of 2496 3620 505661cf2143ff9bcdd7cb7f387c0cd0_NEAS.exe 98 PID 3620 wrote to memory of 2496 3620 505661cf2143ff9bcdd7cb7f387c0cd0_NEAS.exe 98 PID 2496 wrote to memory of 3436 2496 cmd.exe 100 PID 2496 wrote to memory of 3436 2496 cmd.exe 100 PID 2496 wrote to memory of 3436 2496 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\505661cf2143ff9bcdd7cb7f387c0cd0_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\505661cf2143ff9bcdd7cb7f387c0cd0_NEAS.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\AdobeUpdate.exe2⤵
- Executes dropped EXE
PID:1260
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\505661cf2143ff9bcdd7cb7f387c0cd0_NEAS.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:3436
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD55874b1d3848681452081194cac890d13
SHA143b6b4b5114355832406dd64d023c3aacddaaee2
SHA2561c16e2830c1b5dbcb72ca7088869199e911338cf978d3b3dcefefcbad6369d42
SHA512ecae4c65ebb0cb117541c3a18ae90ebdecf004032d2b015b954acec902da3ec981d8787656542792546f5438378ce820fd96f0106c3cda048bf785195c638c27