Analysis
-
max time kernel
148s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 08:15
Static task
static1
Behavioral task
behavioral1
Sample
056e10de60fd9634f6168e46e9ddf0d0_NEAS.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
056e10de60fd9634f6168e46e9ddf0d0_NEAS.exe
Resource
win10v2004-20240419-en
General
-
Target
056e10de60fd9634f6168e46e9ddf0d0_NEAS.exe
-
Size
84KB
-
MD5
056e10de60fd9634f6168e46e9ddf0d0
-
SHA1
aaa39151ba0a28c482e69de129e1ba10b860f753
-
SHA256
2aeb033a6e4dbad95e50a7eb444ab1cc0599135265065678eef7c9f281082471
-
SHA512
f7b9677a24d47a3ec11cf4e99fb7aab8db68be03da368dd07accb302d2551b8a57da40f01d1e19577d2c4538b05a815ad6cd424b3961fc1bc02fd91ff459e1af
-
SSDEEP
1536:1clIGFNMi+hJUneHoGTvvv4V9hqdhbtgS:+RMi+fUnCTvvv4V9hEhbCS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 056e10de60fd9634f6168e46e9ddf0d0_NEAS.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation lsass.exe -
Executes dropped EXE 4 IoCs
pid Process 4036 lsass.exe 3704 lsass.exe 2596 lsass.exe 1900 lsass.exe -
resource yara_rule behavioral2/memory/4880-4-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4880-2-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4880-21-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4880-47-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3704-61-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4880-64-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3704-95-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Audio Driver = "C:\\Users\\Admin\\AppData\\Roaming\\system\\lsass.exe" reg.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3516 set thread context of 4880 3516 056e10de60fd9634f6168e46e9ddf0d0_NEAS.exe 95 PID 4036 set thread context of 3704 4036 lsass.exe 103 PID 4036 set thread context of 2596 4036 lsass.exe 104 PID 2596 set thread context of 1900 2596 lsass.exe 105 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe Token: SeDebugPrivilege 3704 lsass.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3516 056e10de60fd9634f6168e46e9ddf0d0_NEAS.exe 4880 056e10de60fd9634f6168e46e9ddf0d0_NEAS.exe 4036 lsass.exe 3704 lsass.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 3516 wrote to memory of 4880 3516 056e10de60fd9634f6168e46e9ddf0d0_NEAS.exe 95 PID 3516 wrote to memory of 4880 3516 056e10de60fd9634f6168e46e9ddf0d0_NEAS.exe 95 PID 3516 wrote to memory of 4880 3516 056e10de60fd9634f6168e46e9ddf0d0_NEAS.exe 95 PID 3516 wrote to memory of 4880 3516 056e10de60fd9634f6168e46e9ddf0d0_NEAS.exe 95 PID 3516 wrote to memory of 4880 3516 056e10de60fd9634f6168e46e9ddf0d0_NEAS.exe 95 PID 3516 wrote to memory of 4880 3516 056e10de60fd9634f6168e46e9ddf0d0_NEAS.exe 95 PID 3516 wrote to memory of 4880 3516 056e10de60fd9634f6168e46e9ddf0d0_NEAS.exe 95 PID 3516 wrote to memory of 4880 3516 056e10de60fd9634f6168e46e9ddf0d0_NEAS.exe 95 PID 4880 wrote to memory of 3676 4880 056e10de60fd9634f6168e46e9ddf0d0_NEAS.exe 96 PID 4880 wrote to memory of 3676 4880 056e10de60fd9634f6168e46e9ddf0d0_NEAS.exe 96 PID 4880 wrote to memory of 3676 4880 056e10de60fd9634f6168e46e9ddf0d0_NEAS.exe 96 PID 3676 wrote to memory of 888 3676 cmd.exe 99 PID 3676 wrote to memory of 888 3676 cmd.exe 99 PID 3676 wrote to memory of 888 3676 cmd.exe 99 PID 4880 wrote to memory of 4036 4880 056e10de60fd9634f6168e46e9ddf0d0_NEAS.exe 100 PID 4880 wrote to memory of 4036 4880 056e10de60fd9634f6168e46e9ddf0d0_NEAS.exe 100 PID 4880 wrote to memory of 4036 4880 056e10de60fd9634f6168e46e9ddf0d0_NEAS.exe 100 PID 4036 wrote to memory of 3704 4036 lsass.exe 103 PID 4036 wrote to memory of 3704 4036 lsass.exe 103 PID 4036 wrote to memory of 3704 4036 lsass.exe 103 PID 4036 wrote to memory of 3704 4036 lsass.exe 103 PID 4036 wrote to memory of 3704 4036 lsass.exe 103 PID 4036 wrote to memory of 3704 4036 lsass.exe 103 PID 4036 wrote to memory of 3704 4036 lsass.exe 103 PID 4036 wrote to memory of 3704 4036 lsass.exe 103 PID 4036 wrote to memory of 2596 4036 lsass.exe 104 PID 4036 wrote to memory of 2596 4036 lsass.exe 104 PID 4036 wrote to memory of 2596 4036 lsass.exe 104 PID 4036 wrote to memory of 2596 4036 lsass.exe 104 PID 4036 wrote to memory of 2596 4036 lsass.exe 104 PID 4036 wrote to memory of 2596 4036 lsass.exe 104 PID 4036 wrote to memory of 2596 4036 lsass.exe 104 PID 2596 wrote to memory of 1900 2596 lsass.exe 105 PID 2596 wrote to memory of 1900 2596 lsass.exe 105 PID 2596 wrote to memory of 1900 2596 lsass.exe 105 PID 2596 wrote to memory of 1900 2596 lsass.exe 105 PID 2596 wrote to memory of 1900 2596 lsass.exe 105 PID 2596 wrote to memory of 1900 2596 lsass.exe 105 PID 2596 wrote to memory of 1900 2596 lsass.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\056e10de60fd9634f6168e46e9ddf0d0_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\056e10de60fd9634f6168e46e9ddf0d0_NEAS.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\056e10de60fd9634f6168e46e9ddf0d0_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\056e10de60fd9634f6168e46e9ddf0d0_NEAS.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GFSIW.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Audio Driver" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\system\lsass.exe" /f4⤵
- Adds Run key to start application
PID:888
-
-
-
C:\Users\Admin\AppData\Roaming\system\lsass.exe"C:\Users\Admin\AppData\Roaming\system\lsass.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Roaming\system\lsass.exe"C:\Users\Admin\AppData\Roaming\system\lsass.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3704
-
-
C:\Users\Admin\AppData\Roaming\system\lsass.exe"C:\Users\Admin\AppData\Roaming\system\lsass.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Roaming\system\lsass.exe"C:\Users\Admin\AppData\Roaming\system\lsass.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:1900
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
294B
MD538b7711dd6b85cff6716c2bc79f78772
SHA19fce8b2afa1dec94ced06b0938f60723fb563602
SHA256f447f1bc877099214493fcb61f36142cdc2e0efb93c2387c640cb0c10d457939
SHA512991b281fd6fc99c293849353c2ee3748a7ebf25767e94cf83eeea85fe5c6f09f731bdc5388ade091a994fc7e24f7415835fabffd4e0c8995129c131f73da3150
-
Filesize
146B
MD5c8cba0a9d4d5600b5f53c4c0681d1115
SHA10e5348e210ca70b2b0ffdc3ff7e6f611716df80c
SHA256ca2b63f6d7bf17480415ae93e115bf9f9699335e84e62719eefdbcc5a78bd2e1
SHA512a2ad6eb5ae2f6d57ca15363ac2f0c57ca3580474e94b9c010750948814cf4d5ffa0c3e7ef44634a3593da23f56011703ff220a3d7780f6f01785bf3b6676ced0
-
Filesize
84KB
MD5cb57a8ff86182759b4b7e9ea8a2facd8
SHA188faede81a6a5d0448abf9a5a3098e03ee29f8c5
SHA2567afdeaa3d67156240c2436cd8e2d260bb3cd41057dbd2073424f601232915a2a
SHA51247373c3ad1be37b6d50bda6a759b0ac578de6c84c527ba31570b5cf7b773f8087fce15bb27f2dd1662396a8f69b1c63e4642551e9cc4c116348815d28beb598a