Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/10/2023, 17:26

General

  • Target

    NEAS.5076458cf59ac0f6f91ab437d401aafd094eb416a1ed02f255df1918b22cea50_JC.exe

  • Size

    7.1MB

  • MD5

    35d8de1dc16f3e35821214526ea80a8c

  • SHA1

    8b0432b21bacf7e30d4004f15125ae50f9e55d4f

  • SHA256

    5076458cf59ac0f6f91ab437d401aafd094eb416a1ed02f255df1918b22cea50

  • SHA512

    f61ac2b811380a19a4de0839773f50536a920ec7569ed40053498e0fc5406142625eb795d9eeb5cd551d8533eccfa71671a2f48c874ebb41c14bbfe6406c90c0

  • SSDEEP

    196608:yBGdmm83FGiLz/SsWv6hjLWn9jMaRvqpvATML:yRtLzHo6hSn5Mbvo

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Themida packer 9 IoCs

    Detects Themida, an advanced Windows software protection system.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: RenamesItself 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.5076458cf59ac0f6f91ab437d401aafd094eb416a1ed02f255df1918b22cea50_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.5076458cf59ac0f6f91ab437d401aafd094eb416a1ed02f255df1918b22cea50_JC.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4764
    • C:\Users\Admin\Documents\BinGo\pwaapgsu.exe
      "C:\Users\Admin\Documents\BinGo\pwaapgsu.exe" rest
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4800
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4cc 0x2f4
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Desktop\BinGo¹¦ÄÜ°æ13.19.1.lnk

    Filesize

    1KB

    MD5

    c1347dfa9bb8d3bee2347af131cab939

    SHA1

    5046fa047c728982d103353ff135215143955bb8

    SHA256

    5967799cae4caefd995ebb3b8acb82c57d9e9cf4a71751c70e1d75bf62a75753

    SHA512

    481f5cc0ab17d082e02e5161b401036448ba19072d8b80848b69e99b24f9afba7e05ce94116527c01cf8a4029f1e9fd506133685e152adbf91a757beaa8c3be5

  • memory/4764-11-0x0000000010000000-0x000000001011B000-memory.dmp

    Filesize

    1.1MB

  • memory/4764-2-0x0000000000400000-0x00000000010E5000-memory.dmp

    Filesize

    12.9MB

  • memory/4764-3-0x0000000000400000-0x00000000010E5000-memory.dmp

    Filesize

    12.9MB

  • memory/4764-4-0x0000000000400000-0x00000000010E5000-memory.dmp

    Filesize

    12.9MB

  • memory/4764-5-0x0000000010000000-0x000000001011B000-memory.dmp

    Filesize

    1.1MB

  • memory/4764-9-0x0000000010000000-0x000000001011B000-memory.dmp

    Filesize

    1.1MB

  • memory/4764-10-0x0000000010000000-0x000000001011B000-memory.dmp

    Filesize

    1.1MB

  • memory/4764-0-0x0000000000400000-0x00000000010E5000-memory.dmp

    Filesize

    12.9MB

  • memory/4764-13-0x0000000000400000-0x00000000010E5000-memory.dmp

    Filesize

    12.9MB

  • memory/4764-14-0x0000000010000000-0x000000001011B000-memory.dmp

    Filesize

    1.1MB

  • memory/4764-1-0x0000000077274000-0x0000000077276000-memory.dmp

    Filesize

    8KB

  • memory/4800-31-0x0000000006650000-0x0000000006690000-memory.dmp

    Filesize

    256KB

  • memory/4800-35-0x0000000006790000-0x0000000006890000-memory.dmp

    Filesize

    1024KB

  • memory/4800-21-0x0000000010000000-0x000000001011B000-memory.dmp

    Filesize

    1.1MB

  • memory/4800-16-0x0000000000400000-0x00000000010E5000-memory.dmp

    Filesize

    12.9MB

  • memory/4800-24-0x0000000010000000-0x000000001011B000-memory.dmp

    Filesize

    1.1MB

  • memory/4800-33-0x0000000006650000-0x0000000006690000-memory.dmp

    Filesize

    256KB

  • memory/4800-32-0x0000000006650000-0x0000000006690000-memory.dmp

    Filesize

    256KB

  • memory/4800-15-0x0000000000400000-0x00000000010E5000-memory.dmp

    Filesize

    12.9MB

  • memory/4800-34-0x0000000006650000-0x0000000006690000-memory.dmp

    Filesize

    256KB

  • memory/4800-17-0x0000000000400000-0x00000000010E5000-memory.dmp

    Filesize

    12.9MB

  • memory/4800-36-0x0000000006790000-0x0000000006890000-memory.dmp

    Filesize

    1024KB

  • memory/4800-37-0x0000000000400000-0x00000000010E5000-memory.dmp

    Filesize

    12.9MB

  • memory/4800-38-0x0000000010000000-0x000000001011B000-memory.dmp

    Filesize

    1.1MB

  • memory/4800-39-0x0000000006650000-0x0000000006690000-memory.dmp

    Filesize

    256KB

  • memory/4800-40-0x0000000006650000-0x0000000006690000-memory.dmp

    Filesize

    256KB

  • memory/4800-41-0x0000000006650000-0x0000000006690000-memory.dmp

    Filesize

    256KB

  • memory/4800-42-0x0000000006650000-0x0000000006690000-memory.dmp

    Filesize

    256KB

  • memory/4800-43-0x0000000006650000-0x0000000006690000-memory.dmp

    Filesize

    256KB

  • memory/4800-44-0x0000000006790000-0x0000000006890000-memory.dmp

    Filesize

    1024KB

  • memory/4800-45-0x0000000006790000-0x0000000006890000-memory.dmp

    Filesize

    1024KB