Analysis

  • max time kernel
    150s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2024, 12:53

General

  • Target

    8b6b4dedc4785b68169ef666cc776020_NEAS.exe

  • Size

    72KB

  • MD5

    8b6b4dedc4785b68169ef666cc776020

  • SHA1

    c82f006b7fb4206987f567b59c60271cdaac20cf

  • SHA256

    955cdc49827962067a6d85ba9f56ddc1e0f7bb48cb4f470831d90b9eb147d4f8

  • SHA512

    a8a2c1922d38f3756f12553c8fa63627a5eed0c4d5f98a27bcbd377d802cdeff345a256cff8beddeddadc68b07ed166b87ffcfbe0a0b6239aa4ab19453614c34

  • SSDEEP

    768:j2Xw1owYOWJOaoUpd+WXfL4OznetSFB9Oty/N/X+YVhP5itZfP6v+XyQq:yXw1owchf3zegFLEmNfP8Sv+9q

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b6b4dedc4785b68169ef666cc776020_NEAS.exe
    "C:\Users\Admin\AppData\Local\Temp\8b6b4dedc4785b68169ef666cc776020_NEAS.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4372
    • C:\Users\Admin\piuoqi.exe
      "C:\Users\Admin\piuoqi.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4628

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\piuoqi.exe

          Filesize

          72KB

          MD5

          3796dc32dc01e62f3f05d22bf39ad81f

          SHA1

          d8ec090c9f1a17400c24e2bdae71c5684d0e4902

          SHA256

          edf1a663ee931d961dd2e163d0f263a29aab0bfd50d9b37f52fa1c5322e04108

          SHA512

          c1a1f35a5fe5ad0bbeb7da5529b6762a345c1ea13cbb6f25e90facbb27f6981b92193f7e3811925dd9402d7bad081a6f1bb6c13b1130836396c9201524d3ac9a