Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2024, 18:56

General

  • Target

    05dafd2d342a6f1eb03b581cb8a8bf00_NEAS.exe

  • Size

    42KB

  • MD5

    05dafd2d342a6f1eb03b581cb8a8bf00

  • SHA1

    f0b6f4dcd2c62aca5f7ee0c33caf859308467ba2

  • SHA256

    d444d0e257fa21c6533f1757b1b4baf74c4740cd2d452301003c5e40511b2455

  • SHA512

    427baee739dea122d0e2094e64cac8a1361d61ee4675833bcdfc4d7e2febe11bff431b847dec1557cdce32270bd6d95b75575c9b6b15ea660d1928ccab4fc5d9

  • SSDEEP

    768:7cPJdqNiwfKrgXAfTibWi/xRNExm9lp2m//S:QhdqNiwfJAfTibWi/NTEmS

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05dafd2d342a6f1eb03b581cb8a8bf00_NEAS.exe
    "C:\Users\Admin\AppData\Local\Temp\05dafd2d342a6f1eb03b581cb8a8bf00_NEAS.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3704
    • C:\Users\Admin\AppData\Local\Temp\aiapdf.exe
      "C:\Users\Admin\AppData\Local\Temp\aiapdf.exe"
      2⤵
      • Executes dropped EXE
      PID:4852

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\aiapdf.exe

          Filesize

          42KB

          MD5

          07133489078a19165a5bbb789e0e8a33

          SHA1

          2b9fdd5d8afcfd81499b7dd7df6eb55464cfa43e

          SHA256

          739c2899f59cd1a3809a5f0cdbb05877fb5ac48154d1fd9901818ddfa2fb728c

          SHA512

          223e18b92cc17f933cc17783e24dcbc4b32df57b033cac50f69ca788cb0a99c7dca1cdddf35864ea79c747f648cb7f11e31c79d23900b11d4ece75ae6b557a12

        • memory/3704-0-0x0000000004000000-0x0000000004005000-memory.dmp

          Filesize

          20KB

        • memory/3704-1-0x0000000004000000-0x0000000004005000-memory.dmp

          Filesize

          20KB

        • memory/4852-24-0x0000000004000000-0x0000000004005000-memory.dmp

          Filesize

          20KB