Analysis
-
max time kernel
150s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 04:32
Static task
static1
Behavioral task
behavioral1
Sample
678a9cdba4920f80a9417c61d9286d80_NEAS.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
678a9cdba4920f80a9417c61d9286d80_NEAS.exe
Resource
win10v2004-20240426-en
General
-
Target
678a9cdba4920f80a9417c61d9286d80_NEAS.exe
-
Size
180KB
-
MD5
678a9cdba4920f80a9417c61d9286d80
-
SHA1
60e3c870addfd5821d2fe9e34d599d7a4fb4d202
-
SHA256
2125c63302de2e8e659ea268a0542b4fa4a2a3559b3cbd0a578e0bc5a37fab45
-
SHA512
d598b57a2e35800934fc3490e1e3eb92e8f393f9c61f30280188d5768c36d3b80a8f98e8da75e19f45a0befde40b4fbe1aa8e8c6eaeacd115f5921a0e9558edf
-
SSDEEP
768:ld/Hdq9sUHym5j6Xe04H7cHPHYmug6UXQm1dIZE2ocOT77e:lFMym5zHyj6S3T77
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" viuoqu.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation 678a9cdba4920f80a9417c61d9286d80_NEAS.exe -
Executes dropped EXE 1 IoCs
pid Process 1260 viuoqu.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuoqu = "C:\\Users\\Admin\\viuoqu.exe" viuoqu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe 1260 viuoqu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3908 678a9cdba4920f80a9417c61d9286d80_NEAS.exe 1260 viuoqu.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3908 wrote to memory of 1260 3908 678a9cdba4920f80a9417c61d9286d80_NEAS.exe 89 PID 3908 wrote to memory of 1260 3908 678a9cdba4920f80a9417c61d9286d80_NEAS.exe 89 PID 3908 wrote to memory of 1260 3908 678a9cdba4920f80a9417c61d9286d80_NEAS.exe 89 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82 PID 1260 wrote to memory of 3908 1260 viuoqu.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\678a9cdba4920f80a9417c61d9286d80_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\678a9cdba4920f80a9417c61d9286d80_NEAS.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\viuoqu.exe"C:\Users\Admin\viuoqu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD52e804131e2678552d1828172a1121b98
SHA159f66f56fe22e67d5d6c65e395baf362917d80f9
SHA25680e973081f632328fb528c8250b89e02de4b81114bb2938f222a26e49bd9fc40
SHA512d1bc32212ade8d85eca0cef2e5a752ef5a9dbc68f9cc146933cf4a797769ef55fc6c070c3268bbc0559d95a51afd15cdd5d49297ccc14593bda7b640d78aeb13