Analysis
-
max time kernel
153s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2023, 04:31
Behavioral task
behavioral1
Sample
NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe
-
Size
2.5MB
-
MD5
e8b8fde37bf5933ef87d2557a3931fa0
-
SHA1
d8af5c90ec1dcd416a66657c40b4d0e830caf139
-
SHA256
f99a37b08deb8a1e29b6c2ae92b5de92d8d16a0ef443ae999b8522d9023c9815
-
SHA512
2995caf7fd1c9f68720a209a00f9e8a5e7556523e04c9709036bf8827791cf57fef402e5c88888fb5874e07f304c79419a8d3db5aee9b1285c7136c88c25ed50
-
SSDEEP
49152:u4sYA5APvJjKEDMiXKEHPle6bYuYaig+CcMyc20D++qx376m8pSwCygAq:u4XjPvJjVNXKCsMY5XAjSH377GnCygx
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe -
Executes dropped EXE 4 IoCs
pid Process 2764 explorer.exe 4188 spoolsv.exe 920 svchost.exe 4400 spoolsv.exe -
resource yara_rule behavioral2/memory/628-0-0x0000000000400000-0x0000000000A05000-memory.dmp themida behavioral2/files/0x000300000002244f-8.dat themida behavioral2/files/0x000300000002244f-9.dat themida behavioral2/memory/2764-10-0x0000000000400000-0x0000000000A05000-memory.dmp themida behavioral2/files/0x0008000000022e00-15.dat themida behavioral2/files/0x0008000000022e00-18.dat themida behavioral2/files/0x0008000000022e00-17.dat themida behavioral2/memory/4188-19-0x0000000000400000-0x0000000000A05000-memory.dmp themida behavioral2/memory/628-22-0x0000000000400000-0x0000000000A05000-memory.dmp themida behavioral2/memory/2764-26-0x0000000000400000-0x0000000000A05000-memory.dmp themida behavioral2/files/0x0007000000022e1c-28.dat themida behavioral2/files/0x0007000000022e1c-29.dat themida behavioral2/memory/920-30-0x0000000000400000-0x0000000000A05000-memory.dmp themida behavioral2/memory/628-31-0x0000000000400000-0x0000000000A05000-memory.dmp themida behavioral2/memory/4188-36-0x0000000000400000-0x0000000000A05000-memory.dmp themida behavioral2/files/0x0008000000022e00-35.dat themida behavioral2/memory/4400-37-0x0000000000400000-0x0000000000A05000-memory.dmp themida behavioral2/memory/4400-41-0x0000000000400000-0x0000000000A05000-memory.dmp themida behavioral2/memory/4188-42-0x0000000000400000-0x0000000000A05000-memory.dmp themida behavioral2/memory/920-43-0x0000000000400000-0x0000000000A05000-memory.dmp themida behavioral2/memory/2764-44-0x0000000000400000-0x0000000000A05000-memory.dmp themida behavioral2/memory/2764-52-0x0000000000400000-0x0000000000A05000-memory.dmp themida behavioral2/memory/920-55-0x0000000000400000-0x0000000000A05000-memory.dmp themida behavioral2/memory/2764-56-0x0000000000400000-0x0000000000A05000-memory.dmp themida -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 2764 explorer.exe 4188 spoolsv.exe 920 svchost.exe 4400 spoolsv.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2764 explorer.exe 920 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 2764 explorer.exe 2764 explorer.exe 4188 spoolsv.exe 4188 spoolsv.exe 920 svchost.exe 920 svchost.exe 4400 spoolsv.exe 4400 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 628 wrote to memory of 2764 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 91 PID 628 wrote to memory of 2764 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 91 PID 628 wrote to memory of 2764 628 NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe 91 PID 2764 wrote to memory of 4188 2764 explorer.exe 94 PID 2764 wrote to memory of 4188 2764 explorer.exe 94 PID 2764 wrote to memory of 4188 2764 explorer.exe 94 PID 4188 wrote to memory of 920 4188 spoolsv.exe 97 PID 4188 wrote to memory of 920 4188 spoolsv.exe 97 PID 4188 wrote to memory of 920 4188 spoolsv.exe 97 PID 920 wrote to memory of 4400 920 svchost.exe 100 PID 920 wrote to memory of 4400 920 svchost.exe 100 PID 920 wrote to memory of 4400 920 svchost.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e8b8fde37bf5933ef87d2557a3931fa0.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:628 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4188 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:920 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4400
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5a77d379188b95a3849d56892ab8b2a96
SHA1633a0ebf69f8eb6b4758caa8742c2431ab2d4b80
SHA256ced48e57201c0cf4be256ddc358d8cfee072bb15a5d8ae0f5bbf58a431c0cb3d
SHA5129678093a3099a729ce95a258841d0438bb931167537689b9dcfc2a475fc08148243dc01352c534058cccfa0f09e4854ad947e826f6ea9300e0f47a824ce28367
-
Filesize
2.5MB
MD543c30bb83d26f63c38d892ac95e40796
SHA188c4d045afa17782f6adc1f6adf20fc74cb64f51
SHA256ab3fa0e3b873c9d07ffea8caca141df6c05dff43c1f5159c38b40de5238cce0f
SHA5126d9aa749e433fd9ab9832d443f1162cd83c6a3da32186fd6a9c4d3f8e16d86eac408c6427a9766551b4c95293cfa01f97f87bbcddc94f75835aebba537b66ec4
-
Filesize
2.5MB
MD543c30bb83d26f63c38d892ac95e40796
SHA188c4d045afa17782f6adc1f6adf20fc74cb64f51
SHA256ab3fa0e3b873c9d07ffea8caca141df6c05dff43c1f5159c38b40de5238cce0f
SHA5126d9aa749e433fd9ab9832d443f1162cd83c6a3da32186fd6a9c4d3f8e16d86eac408c6427a9766551b4c95293cfa01f97f87bbcddc94f75835aebba537b66ec4
-
Filesize
2.5MB
MD543c30bb83d26f63c38d892ac95e40796
SHA188c4d045afa17782f6adc1f6adf20fc74cb64f51
SHA256ab3fa0e3b873c9d07ffea8caca141df6c05dff43c1f5159c38b40de5238cce0f
SHA5126d9aa749e433fd9ab9832d443f1162cd83c6a3da32186fd6a9c4d3f8e16d86eac408c6427a9766551b4c95293cfa01f97f87bbcddc94f75835aebba537b66ec4
-
Filesize
2.5MB
MD511d7ec87697aef7207dec7037aff7994
SHA1297c07a35a0da4754414c809a39fac4ff8e83ba9
SHA2563359fdff65e071dd02cb6cec3e13a627c4653c86e7d1f07818ed4bbb8f9651ec
SHA512a425a17edd1734df96e3698096e36eaa81cf014d61edd97a441a3869d28007fb0af9bf62e03b571dda891f0dc9c434e047537d8ba785ca49a725a2b8b7d254b9
-
Filesize
2.5MB
MD543c30bb83d26f63c38d892ac95e40796
SHA188c4d045afa17782f6adc1f6adf20fc74cb64f51
SHA256ab3fa0e3b873c9d07ffea8caca141df6c05dff43c1f5159c38b40de5238cce0f
SHA5126d9aa749e433fd9ab9832d443f1162cd83c6a3da32186fd6a9c4d3f8e16d86eac408c6427a9766551b4c95293cfa01f97f87bbcddc94f75835aebba537b66ec4
-
Filesize
2.5MB
MD511d7ec87697aef7207dec7037aff7994
SHA1297c07a35a0da4754414c809a39fac4ff8e83ba9
SHA2563359fdff65e071dd02cb6cec3e13a627c4653c86e7d1f07818ed4bbb8f9651ec
SHA512a425a17edd1734df96e3698096e36eaa81cf014d61edd97a441a3869d28007fb0af9bf62e03b571dda891f0dc9c434e047537d8ba785ca49a725a2b8b7d254b9
-
Filesize
2.5MB
MD5a77d379188b95a3849d56892ab8b2a96
SHA1633a0ebf69f8eb6b4758caa8742c2431ab2d4b80
SHA256ced48e57201c0cf4be256ddc358d8cfee072bb15a5d8ae0f5bbf58a431c0cb3d
SHA5129678093a3099a729ce95a258841d0438bb931167537689b9dcfc2a475fc08148243dc01352c534058cccfa0f09e4854ad947e826f6ea9300e0f47a824ce28367