Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
06-11-2023 01:37
Behavioral task
behavioral1
Sample
NEAS.61ab9d4f3a5493ce8f2959a6eea1bff0.exe
Resource
win7-20231020-en
General
-
Target
NEAS.61ab9d4f3a5493ce8f2959a6eea1bff0.exe
-
Size
2.6MB
-
MD5
61ab9d4f3a5493ce8f2959a6eea1bff0
-
SHA1
d31ca633dafd80e0e603ab3cb84cdc3c3d1d852c
-
SHA256
c70072a79ee4f1793dd6ee13624178c7dbc8c085a99715a2e19f89e59e83d2b3
-
SHA512
a1a50232bb98a03835f1c4d5138c792a069ba8ce408e5d3194ad6cdc1389b939d2b0fc5b3cdadcd6fbf4ec62a08ea1c9a2bb4b43982bbffead01847bc942fd9a
-
SSDEEP
49152:kr+2uK5YdMOMRhPtlRmTIIpMKo+GervVPMrG801uHBPbwwvRsfQ:kr/vDRd1BrGMHVqQ
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ NEAS.61ab9d4f3a5493ce8f2959a6eea1bff0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ajahmjj.exe -
Modifies AppInit DLL entries 2 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ajahmjj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion NEAS.61ab9d4f3a5493ce8f2959a6eea1bff0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion NEAS.61ab9d4f3a5493ce8f2959a6eea1bff0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ajahmjj.exe -
Executes dropped EXE 1 IoCs
pid Process 2276 ajahmjj.exe -
resource yara_rule behavioral1/memory/2152-0-0x0000000000400000-0x0000000000AB4000-memory.dmp themida behavioral1/memory/2152-1-0x0000000000400000-0x0000000000AB4000-memory.dmp themida behavioral1/files/0x0020000000014b5d-6.dat themida behavioral1/files/0x0020000000014b5d-7.dat themida behavioral1/memory/2276-8-0x0000000000400000-0x0000000000AB4000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NEAS.61ab9d4f3a5493ce8f2959a6eea1bff0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ajahmjj.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\ajahmjj.exe NEAS.61ab9d4f3a5493ce8f2959a6eea1bff0.exe File created C:\PROGRA~3\Mozilla\ghzyxbm.dll ajahmjj.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2152 NEAS.61ab9d4f3a5493ce8f2959a6eea1bff0.exe 2276 ajahmjj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2276 2876 taskeng.exe 29 PID 2876 wrote to memory of 2276 2876 taskeng.exe 29 PID 2876 wrote to memory of 2276 2876 taskeng.exe 29 PID 2876 wrote to memory of 2276 2876 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.61ab9d4f3a5493ce8f2959a6eea1bff0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.61ab9d4f3a5493ce8f2959a6eea1bff0.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2152
-
C:\Windows\system32\taskeng.exetaskeng.exe {87DF26BC-E42B-4D36-AE10-9E946C971626} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\PROGRA~3\Mozilla\ajahmjj.exeC:\PROGRA~3\Mozilla\ajahmjj.exe -mngyzad2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5a529473537f4d09e32a89fbfa919f497
SHA1a80fe07c6e70c97cb2c1d0275eb17f7f92377cd1
SHA25604a5d7b6e49bc726bdaeed2ed179ec9b5bda1b0cf4bee8c995b7867d74c3fdf0
SHA512294b131c5d45f5779f01ef7ae1d26bdff907eb9ae9a368c6b3b66693ee234cfd2e844c5278c1bb3724031738965cf24b5899d5022e5b740f8fc793a03540577c
-
Filesize
2.6MB
MD5a529473537f4d09e32a89fbfa919f497
SHA1a80fe07c6e70c97cb2c1d0275eb17f7f92377cd1
SHA25604a5d7b6e49bc726bdaeed2ed179ec9b5bda1b0cf4bee8c995b7867d74c3fdf0
SHA512294b131c5d45f5779f01ef7ae1d26bdff907eb9ae9a368c6b3b66693ee234cfd2e844c5278c1bb3724031738965cf24b5899d5022e5b740f8fc793a03540577c