Analysis
-
max time kernel
178s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 19:14
Behavioral task
behavioral1
Sample
NEAS.d296c8db00ba7a7315e15403447f4c00.exe
Resource
win7-20230831-en
6 signatures
150 seconds
General
-
Target
NEAS.d296c8db00ba7a7315e15403447f4c00.exe
-
Size
3.8MB
-
MD5
d296c8db00ba7a7315e15403447f4c00
-
SHA1
d0824335e3dfcd931a8e56def94abd882bb1a6d2
-
SHA256
3f239909a96b59b7b81bf714ca7c0b293773efafea8e02891c5a2a2bfc58dd68
-
SHA512
4bab9831751bbc8a7ae82c467e080df0afbdf2ec0a762eb4b251ec06ead685857e3d9be97d3a0e041590a5077f69d90b5f661e625df39abd1ff9d491f44f86d7
-
SSDEEP
98304:kXnePLpXsosKbzubE0IdC7AFEwY2k1oQVAIfotgJWdSx:kXWL9PKUpYVX
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ NEAS.d296c8db00ba7a7315e15403447f4c00.exe -
mimikatz is an open source tool to dump credentials on Windows 6 IoCs
resource yara_rule behavioral2/memory/228-3-0x00007FF66E290000-0x00007FF66EC9A000-memory.dmp mimikatz behavioral2/memory/228-4-0x00007FF66E290000-0x00007FF66EC9A000-memory.dmp mimikatz behavioral2/memory/228-5-0x00007FF66E290000-0x00007FF66EC9A000-memory.dmp mimikatz behavioral2/memory/228-6-0x00007FF66E290000-0x00007FF66EC9A000-memory.dmp mimikatz behavioral2/memory/228-7-0x00007FF66E290000-0x00007FF66EC9A000-memory.dmp mimikatz behavioral2/memory/228-8-0x00007FF66E290000-0x00007FF66EC9A000-memory.dmp mimikatz -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion NEAS.d296c8db00ba7a7315e15403447f4c00.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion NEAS.d296c8db00ba7a7315e15403447f4c00.exe -
resource yara_rule behavioral2/memory/228-0-0x00007FF66E290000-0x00007FF66EC9A000-memory.dmp themida behavioral2/memory/228-1-0x00007FF66E290000-0x00007FF66EC9A000-memory.dmp themida behavioral2/memory/228-2-0x00007FF66E290000-0x00007FF66EC9A000-memory.dmp themida behavioral2/memory/228-3-0x00007FF66E290000-0x00007FF66EC9A000-memory.dmp themida behavioral2/memory/228-4-0x00007FF66E290000-0x00007FF66EC9A000-memory.dmp themida behavioral2/memory/228-5-0x00007FF66E290000-0x00007FF66EC9A000-memory.dmp themida behavioral2/memory/228-6-0x00007FF66E290000-0x00007FF66EC9A000-memory.dmp themida behavioral2/memory/228-7-0x00007FF66E290000-0x00007FF66EC9A000-memory.dmp themida behavioral2/memory/228-8-0x00007FF66E290000-0x00007FF66EC9A000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NEAS.d296c8db00ba7a7315e15403447f4c00.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d296c8db00ba7a7315e15403447f4c00.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d296c8db00ba7a7315e15403447f4c00.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:228