Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2023, 17:07
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.10d4f5dcff804de186948afbcd2ed49fd39e6af8da9ea41d7f6d29162de273d5_JC.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.10d4f5dcff804de186948afbcd2ed49fd39e6af8da9ea41d7f6d29162de273d5_JC.dll
Resource
win10v2004-20230915-en
General
-
Target
NEAS.10d4f5dcff804de186948afbcd2ed49fd39e6af8da9ea41d7f6d29162de273d5_JC.dll
-
Size
5.6MB
-
MD5
b47bbc48f28a58589793d4ab30e7eeca
-
SHA1
741f01f1db9ed5717d3fd9cdff7d2d846bf10e26
-
SHA256
10d4f5dcff804de186948afbcd2ed49fd39e6af8da9ea41d7f6d29162de273d5
-
SHA512
9b4536278ab3c6c1abeed090464a8a07fd29ae5c621dd093a5d6ef82aec0bef4644e15d05051df416c62141730b4c9f2f654c196b0d12bb9f9c845f301248b41
-
SSDEEP
98304:lz45zXY6iicwsC869ljE4HxLcMqsse1mGuNBUDTC5Lgl9RIeMSIJ1u4y6C9ipwO9:R49tcLj6vjE4Hx1FsQp+gfRRhIJ9o9oE
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4120 rundll32.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\CLSID\{9cc7d970-80e7-3da1-a0c0-dbd716aa} rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\CLSID\{9cc7d970-80e7-3da1-a0c0-dbd716aa}\LocalizedString = 79360fc361b5fa1a0825bc8e rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\CLSID\{a04c0187-5773-1bcc-986c-20368356} rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\CLSID\{a04c0187-5773-1bcc-986c-20368356}\InfoTip = fdb2bb0e6fb5ea0a5646589e rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.10d4f5dcff804de186948afbcd2ed49fd39e6af8da9ea41d7f6d29162de273d5_JC.dll,#11⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
PID:4120