Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2023, 17:26
Behavioral task
behavioral1
Sample
NEAS.5076458cf59ac0f6f91ab437d401aafd094eb416a1ed02f255df1918b22cea50_JC.exe
Resource
win7-20230831-en
General
-
Target
NEAS.5076458cf59ac0f6f91ab437d401aafd094eb416a1ed02f255df1918b22cea50_JC.exe
-
Size
7.1MB
-
MD5
35d8de1dc16f3e35821214526ea80a8c
-
SHA1
8b0432b21bacf7e30d4004f15125ae50f9e55d4f
-
SHA256
5076458cf59ac0f6f91ab437d401aafd094eb416a1ed02f255df1918b22cea50
-
SHA512
f61ac2b811380a19a4de0839773f50536a920ec7569ed40053498e0fc5406142625eb795d9eeb5cd551d8533eccfa71671a2f48c874ebb41c14bbfe6406c90c0
-
SSDEEP
196608:yBGdmm83FGiLz/SsWv6hjLWn9jMaRvqpvATML:yRtLzHo6hSn5Mbvo
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ NEAS.5076458cf59ac0f6f91ab437d401aafd094eb416a1ed02f255df1918b22cea50_JC.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ pwaapgsu.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion NEAS.5076458cf59ac0f6f91ab437d401aafd094eb416a1ed02f255df1918b22cea50_JC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion NEAS.5076458cf59ac0f6f91ab437d401aafd094eb416a1ed02f255df1918b22cea50_JC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion pwaapgsu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion pwaapgsu.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation NEAS.5076458cf59ac0f6f91ab437d401aafd094eb416a1ed02f255df1918b22cea50_JC.exe -
resource yara_rule behavioral2/memory/4764-0-0x0000000000400000-0x00000000010E5000-memory.dmp themida behavioral2/memory/4764-2-0x0000000000400000-0x00000000010E5000-memory.dmp themida behavioral2/memory/4764-3-0x0000000000400000-0x00000000010E5000-memory.dmp themida behavioral2/memory/4764-4-0x0000000000400000-0x00000000010E5000-memory.dmp themida behavioral2/memory/4764-13-0x0000000000400000-0x00000000010E5000-memory.dmp themida behavioral2/memory/4800-15-0x0000000000400000-0x00000000010E5000-memory.dmp themida behavioral2/memory/4800-16-0x0000000000400000-0x00000000010E5000-memory.dmp themida behavioral2/memory/4800-17-0x0000000000400000-0x00000000010E5000-memory.dmp themida behavioral2/memory/4800-37-0x0000000000400000-0x00000000010E5000-memory.dmp themida -
resource yara_rule behavioral2/memory/4764-5-0x0000000010000000-0x000000001011B000-memory.dmp upx behavioral2/memory/4764-9-0x0000000010000000-0x000000001011B000-memory.dmp upx behavioral2/memory/4764-10-0x0000000010000000-0x000000001011B000-memory.dmp upx behavioral2/memory/4764-11-0x0000000010000000-0x000000001011B000-memory.dmp upx behavioral2/memory/4764-14-0x0000000010000000-0x000000001011B000-memory.dmp upx behavioral2/memory/4800-21-0x0000000010000000-0x000000001011B000-memory.dmp upx behavioral2/memory/4800-24-0x0000000010000000-0x000000001011B000-memory.dmp upx behavioral2/memory/4800-38-0x0000000010000000-0x000000001011B000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NEAS.5076458cf59ac0f6f91ab437d401aafd094eb416a1ed02f255df1918b22cea50_JC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA pwaapgsu.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4764 NEAS.5076458cf59ac0f6f91ab437d401aafd094eb416a1ed02f255df1918b22cea50_JC.exe 4800 pwaapgsu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4764 NEAS.5076458cf59ac0f6f91ab437d401aafd094eb416a1ed02f255df1918b22cea50_JC.exe 4764 NEAS.5076458cf59ac0f6f91ab437d401aafd094eb416a1ed02f255df1918b22cea50_JC.exe 4800 pwaapgsu.exe 4800 pwaapgsu.exe -
Suspicious behavior: RenamesItself 2 IoCs
pid Process 4764 NEAS.5076458cf59ac0f6f91ab437d401aafd094eb416a1ed02f255df1918b22cea50_JC.exe 4800 pwaapgsu.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4800 pwaapgsu.exe Token: 33 3844 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3844 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4764 NEAS.5076458cf59ac0f6f91ab437d401aafd094eb416a1ed02f255df1918b22cea50_JC.exe 4764 NEAS.5076458cf59ac0f6f91ab437d401aafd094eb416a1ed02f255df1918b22cea50_JC.exe 4800 pwaapgsu.exe 4800 pwaapgsu.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4764 wrote to memory of 4800 4764 NEAS.5076458cf59ac0f6f91ab437d401aafd094eb416a1ed02f255df1918b22cea50_JC.exe 87 PID 4764 wrote to memory of 4800 4764 NEAS.5076458cf59ac0f6f91ab437d401aafd094eb416a1ed02f255df1918b22cea50_JC.exe 87 PID 4764 wrote to memory of 4800 4764 NEAS.5076458cf59ac0f6f91ab437d401aafd094eb416a1ed02f255df1918b22cea50_JC.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5076458cf59ac0f6f91ab437d401aafd094eb416a1ed02f255df1918b22cea50_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5076458cf59ac0f6f91ab437d401aafd094eb416a1ed02f255df1918b22cea50_JC.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\Documents\BinGo\pwaapgsu.exe"C:\Users\Admin\Documents\BinGo\pwaapgsu.exe" rest2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4800
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4cc 0x2f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:3844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c1347dfa9bb8d3bee2347af131cab939
SHA15046fa047c728982d103353ff135215143955bb8
SHA2565967799cae4caefd995ebb3b8acb82c57d9e9cf4a71751c70e1d75bf62a75753
SHA512481f5cc0ab17d082e02e5161b401036448ba19072d8b80848b69e99b24f9afba7e05ce94116527c01cf8a4029f1e9fd506133685e152adbf91a757beaa8c3be5