Analysis

  • max time kernel
    150s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2024, 04:32

General

  • Target

    678a9cdba4920f80a9417c61d9286d80_NEAS.exe

  • Size

    180KB

  • MD5

    678a9cdba4920f80a9417c61d9286d80

  • SHA1

    60e3c870addfd5821d2fe9e34d599d7a4fb4d202

  • SHA256

    2125c63302de2e8e659ea268a0542b4fa4a2a3559b3cbd0a578e0bc5a37fab45

  • SHA512

    d598b57a2e35800934fc3490e1e3eb92e8f393f9c61f30280188d5768c36d3b80a8f98e8da75e19f45a0befde40b4fbe1aa8e8c6eaeacd115f5921a0e9558edf

  • SSDEEP

    768:ld/Hdq9sUHym5j6Xe04H7cHPHYmug6UXQm1dIZE2ocOT77e:lFMym5zHyj6S3T77

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\678a9cdba4920f80a9417c61d9286d80_NEAS.exe
    "C:\Users\Admin\AppData\Local\Temp\678a9cdba4920f80a9417c61d9286d80_NEAS.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3908
    • C:\Users\Admin\viuoqu.exe
      "C:\Users\Admin\viuoqu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1260

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\viuoqu.exe

          Filesize

          180KB

          MD5

          2e804131e2678552d1828172a1121b98

          SHA1

          59f66f56fe22e67d5d6c65e395baf362917d80f9

          SHA256

          80e973081f632328fb528c8250b89e02de4b81114bb2938f222a26e49bd9fc40

          SHA512

          d1bc32212ade8d85eca0cef2e5a752ef5a9dbc68f9cc146933cf4a797769ef55fc6c070c3268bbc0559d95a51afd15cdd5d49297ccc14593bda7b640d78aeb13

        • memory/1260-22-0x0000000000400000-0x000000000042D000-memory.dmp

          Filesize

          180KB

        • memory/3908-0-0x0000000000400000-0x000000000042D000-memory.dmp

          Filesize

          180KB