Analysis

  • max time kernel
    142s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2023, 19:14

General

  • Target

    NEAS.d296c8db00ba7a7315e15403447f4c00.exe

  • Size

    3.8MB

  • MD5

    d296c8db00ba7a7315e15403447f4c00

  • SHA1

    d0824335e3dfcd931a8e56def94abd882bb1a6d2

  • SHA256

    3f239909a96b59b7b81bf714ca7c0b293773efafea8e02891c5a2a2bfc58dd68

  • SHA512

    4bab9831751bbc8a7ae82c467e080df0afbdf2ec0a762eb4b251ec06ead685857e3d9be97d3a0e041590a5077f69d90b5f661e625df39abd1ff9d491f44f86d7

  • SSDEEP

    98304:kXnePLpXsosKbzubE0IdC7AFEwY2k1oQVAIfotgJWdSx:kXWL9PKUpYVX

Malware Config

Signatures

  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 6 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 9 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.d296c8db00ba7a7315e15403447f4c00.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.d296c8db00ba7a7315e15403447f4c00.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    PID:2068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2068-0-0x000000013FFC0000-0x00000001409CA000-memory.dmp

    Filesize

    10.0MB

  • memory/2068-1-0x000000013FFC0000-0x00000001409CA000-memory.dmp

    Filesize

    10.0MB

  • memory/2068-2-0x000000013FFC0000-0x00000001409CA000-memory.dmp

    Filesize

    10.0MB

  • memory/2068-3-0x000000013FFC0000-0x00000001409CA000-memory.dmp

    Filesize

    10.0MB

  • memory/2068-4-0x000000013FFC0000-0x00000001409CA000-memory.dmp

    Filesize

    10.0MB

  • memory/2068-5-0x000000013FFC0000-0x00000001409CA000-memory.dmp

    Filesize

    10.0MB

  • memory/2068-6-0x000000013FFC0000-0x00000001409CA000-memory.dmp

    Filesize

    10.0MB

  • memory/2068-7-0x000000013FFC0000-0x00000001409CA000-memory.dmp

    Filesize

    10.0MB

  • memory/2068-8-0x000000013FFC0000-0x00000001409CA000-memory.dmp

    Filesize

    10.0MB