Analysis

  • max time kernel
    178s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2023, 19:14

General

  • Target

    NEAS.d296c8db00ba7a7315e15403447f4c00.exe

  • Size

    3.8MB

  • MD5

    d296c8db00ba7a7315e15403447f4c00

  • SHA1

    d0824335e3dfcd931a8e56def94abd882bb1a6d2

  • SHA256

    3f239909a96b59b7b81bf714ca7c0b293773efafea8e02891c5a2a2bfc58dd68

  • SHA512

    4bab9831751bbc8a7ae82c467e080df0afbdf2ec0a762eb4b251ec06ead685857e3d9be97d3a0e041590a5077f69d90b5f661e625df39abd1ff9d491f44f86d7

  • SSDEEP

    98304:kXnePLpXsosKbzubE0IdC7AFEwY2k1oQVAIfotgJWdSx:kXWL9PKUpYVX

Malware Config

Signatures

  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 6 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 9 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.d296c8db00ba7a7315e15403447f4c00.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.d296c8db00ba7a7315e15403447f4c00.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    PID:228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/228-0-0x00007FF66E290000-0x00007FF66EC9A000-memory.dmp

    Filesize

    10.0MB

  • memory/228-1-0x00007FF66E290000-0x00007FF66EC9A000-memory.dmp

    Filesize

    10.0MB

  • memory/228-2-0x00007FF66E290000-0x00007FF66EC9A000-memory.dmp

    Filesize

    10.0MB

  • memory/228-3-0x00007FF66E290000-0x00007FF66EC9A000-memory.dmp

    Filesize

    10.0MB

  • memory/228-4-0x00007FF66E290000-0x00007FF66EC9A000-memory.dmp

    Filesize

    10.0MB

  • memory/228-5-0x00007FF66E290000-0x00007FF66EC9A000-memory.dmp

    Filesize

    10.0MB

  • memory/228-6-0x00007FF66E290000-0x00007FF66EC9A000-memory.dmp

    Filesize

    10.0MB

  • memory/228-7-0x00007FF66E290000-0x00007FF66EC9A000-memory.dmp

    Filesize

    10.0MB

  • memory/228-8-0x00007FF66E290000-0x00007FF66EC9A000-memory.dmp

    Filesize

    10.0MB