Analysis

  • max time kernel
    135s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-05-2024 09:17

General

  • Target

    1f4ac5a31045447977618c64c833eb70_NEAS.exe

  • Size

    29KB

  • MD5

    1f4ac5a31045447977618c64c833eb70

  • SHA1

    0e69c440a7fd8efe4b0a33bc76db6b03297185b3

  • SHA256

    8bd75f9c6b4035dc30c7a3ed9913702c91115a9561cfb262a5b4d630e4d8cbed

  • SHA512

    f7375767e8f79da4886b8e355a27b5204e519fa37dcad2b62a9090e15adab5e01013b8c29524759a8335e7184233cb03a71a08d10ec01c3c8b1edfb614d0de76

  • SSDEEP

    384:6gmi9aclTHApPFpPNyE40aFF666666666JJ7UueqrDjFvbusSFb2+hjc5QQIe:RmIVAp7lyHeUueqkpFb/Fe

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f4ac5a31045447977618c64c833eb70_NEAS.exe
    "C:\Users\Admin\AppData\Local\Temp\1f4ac5a31045447977618c64c833eb70_NEAS.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:556
    • C:\Users\Admin\AppData\Local\Temp\codecupdate.exe
      "C:\Users\Admin\AppData\Local\Temp\codecupdate.exe"
      2⤵
      • Executes dropped EXE
      PID:3452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\codecupdate.exe

    Filesize

    29KB

    MD5

    7fec26a9ddfe767902c24658927af1e7

    SHA1

    049fdf77bb93afd07da7d33ff04e371cf27e1510

    SHA256

    cb7c0ebb55fa50e3e58def2d7854594ea814201a2862c0fa758462a5acc9a363

    SHA512

    cc1ae0ce5027ddc31abf7a78faef3781bfec34ad68c2c4a7e60b4483da4b93b2323019fb0e348a8f8a9c518245030db593569b9f6eaf8af5010b367ddfe1daf2

  • memory/556-0-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/556-2-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB

  • memory/556-13-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3452-14-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3452-15-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB