Analysis

  • max time kernel
    151s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/11/2023, 21:27

General

  • Target

    NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe

  • Size

    1.7MB

  • MD5

    6d56776a0d3b0ae92498cdfa590e8ca0

  • SHA1

    23d21c678f6c02b54ab61d6eb20e6e2ff5d47465

  • SHA256

    7f21d8dcb9b3613d829ae97526b141b2e4c35cb286a9bdf1a3a1a7e895f03bc9

  • SHA512

    521eec1f23769f06698858a43c57d056b3672e6b9b71433073cada9eaf724f0c1f523d324f3583cf29c3f5254495e490eb17eb32b16437a28b84b73a262e6d54

  • SSDEEP

    49152:DpPNiqTVoiCVsqSMRrQFTAm4o24TduMpwNRU:NNiqpcsFCrQFEm40vpwQ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2272
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3036
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3352
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3304
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetWindowsHookEx
            PID:3472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    1.7MB

    MD5

    ef12dd3375bb1bc3bd97c188a092edfa

    SHA1

    8719852c55dd20040beee12c9da79be5ea2b504a

    SHA256

    8f44d94b9bc35570cb7a7baebd27604c82c32cdcfa622361a3a71d7e22ae7f4f

    SHA512

    1168ecaa50e5df87a21536b946603ce50a2ce2e8d67ae1aa536fe2b6732f7aad805c18fb2ef4dddc8a1bb4a0bc25f05d7a61aa273bbef4d0c2c68a32f48457d0

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    1.7MB

    MD5

    247b501cc457f26ed4757bfba700d93d

    SHA1

    87ed9620a7d8df3d97cbb308f9d283c7335b11a2

    SHA256

    818653b2b353dd5d02fbefc84b5e355aace483b17f9ce80d97cf56fd9acd12a3

    SHA512

    d5db732d19ff617347c581944a39286eb646310fc1ea726044a73bca5a44f33d7904cbd469373167236a0ca613ced3ddd141ed819190f7779376d1c550e39a19

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    1.7MB

    MD5

    247b501cc457f26ed4757bfba700d93d

    SHA1

    87ed9620a7d8df3d97cbb308f9d283c7335b11a2

    SHA256

    818653b2b353dd5d02fbefc84b5e355aace483b17f9ce80d97cf56fd9acd12a3

    SHA512

    d5db732d19ff617347c581944a39286eb646310fc1ea726044a73bca5a44f33d7904cbd469373167236a0ca613ced3ddd141ed819190f7779376d1c550e39a19

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    1.7MB

    MD5

    247b501cc457f26ed4757bfba700d93d

    SHA1

    87ed9620a7d8df3d97cbb308f9d283c7335b11a2

    SHA256

    818653b2b353dd5d02fbefc84b5e355aace483b17f9ce80d97cf56fd9acd12a3

    SHA512

    d5db732d19ff617347c581944a39286eb646310fc1ea726044a73bca5a44f33d7904cbd469373167236a0ca613ced3ddd141ed819190f7779376d1c550e39a19

  • C:\Windows\Resources\svchost.exe

    Filesize

    1.7MB

    MD5

    d0b2b582216adbb7b47b0e44a2552fad

    SHA1

    fa8656d70a9f12b9a38f9fca550ad37c0861c454

    SHA256

    5d14b2c795eb3b35f40c2d176ff28d7dc9cc77809b50cfb9e9866ea0d870d8c7

    SHA512

    f52c328dfc31146b17990463848b51d8b9101a6fc4629a270788f919ba977b5cdc46517733e83802ec22231c5348850dab82f9d042ca42ab47f2ba175071df34

  • \??\c:\windows\resources\spoolsv.exe

    Filesize

    1.7MB

    MD5

    247b501cc457f26ed4757bfba700d93d

    SHA1

    87ed9620a7d8df3d97cbb308f9d283c7335b11a2

    SHA256

    818653b2b353dd5d02fbefc84b5e355aace483b17f9ce80d97cf56fd9acd12a3

    SHA512

    d5db732d19ff617347c581944a39286eb646310fc1ea726044a73bca5a44f33d7904cbd469373167236a0ca613ced3ddd141ed819190f7779376d1c550e39a19

  • \??\c:\windows\resources\svchost.exe

    Filesize

    1.7MB

    MD5

    d0b2b582216adbb7b47b0e44a2552fad

    SHA1

    fa8656d70a9f12b9a38f9fca550ad37c0861c454

    SHA256

    5d14b2c795eb3b35f40c2d176ff28d7dc9cc77809b50cfb9e9866ea0d870d8c7

    SHA512

    f52c328dfc31146b17990463848b51d8b9101a6fc4629a270788f919ba977b5cdc46517733e83802ec22231c5348850dab82f9d042ca42ab47f2ba175071df34

  • \??\c:\windows\resources\themes\explorer.exe

    Filesize

    1.7MB

    MD5

    ef12dd3375bb1bc3bd97c188a092edfa

    SHA1

    8719852c55dd20040beee12c9da79be5ea2b504a

    SHA256

    8f44d94b9bc35570cb7a7baebd27604c82c32cdcfa622361a3a71d7e22ae7f4f

    SHA512

    1168ecaa50e5df87a21536b946603ce50a2ce2e8d67ae1aa536fe2b6732f7aad805c18fb2ef4dddc8a1bb4a0bc25f05d7a61aa273bbef4d0c2c68a32f48457d0

  • memory/2272-9-0x0000000004DD0000-0x0000000004DD1000-memory.dmp

    Filesize

    4KB

  • memory/2272-0-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/2272-13-0x0000000004EB0000-0x0000000004EB2000-memory.dmp

    Filesize

    8KB

  • memory/2272-15-0x0000000004880000-0x0000000004881000-memory.dmp

    Filesize

    4KB

  • memory/2272-14-0x00000000048A0000-0x00000000048A1000-memory.dmp

    Filesize

    4KB

  • memory/2272-18-0x0000000004850000-0x0000000004851000-memory.dmp

    Filesize

    4KB

  • memory/2272-11-0x00000000048B0000-0x00000000048B1000-memory.dmp

    Filesize

    4KB

  • memory/2272-102-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/2272-10-0x0000000004860000-0x0000000004861000-memory.dmp

    Filesize

    4KB

  • memory/2272-12-0x0000000004E00000-0x0000000004E02000-memory.dmp

    Filesize

    8KB

  • memory/2272-7-0x0000000004870000-0x0000000004871000-memory.dmp

    Filesize

    4KB

  • memory/2272-28-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/2272-8-0x0000000004840000-0x0000000004841000-memory.dmp

    Filesize

    4KB

  • memory/2272-3-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/2272-2-0x0000000074760000-0x00000000748BD000-memory.dmp

    Filesize

    1.4MB

  • memory/2272-1-0x0000000077394000-0x0000000077396000-memory.dmp

    Filesize

    8KB

  • memory/2272-40-0x0000000074760000-0x00000000748BD000-memory.dmp

    Filesize

    1.4MB

  • memory/3036-36-0x0000000004E10000-0x0000000004E12000-memory.dmp

    Filesize

    8KB

  • memory/3036-23-0x0000000074760000-0x00000000748BD000-memory.dmp

    Filesize

    1.4MB

  • memory/3036-38-0x0000000004DC0000-0x0000000004DC1000-memory.dmp

    Filesize

    4KB

  • memory/3036-39-0x0000000004DA0000-0x0000000004DA1000-memory.dmp

    Filesize

    4KB

  • memory/3036-33-0x0000000004DD0000-0x0000000004DD1000-memory.dmp

    Filesize

    4KB

  • memory/3036-41-0x0000000004D70000-0x0000000004D71000-memory.dmp

    Filesize

    4KB

  • memory/3036-32-0x0000000004D80000-0x0000000004D81000-memory.dmp

    Filesize

    4KB

  • memory/3036-31-0x0000000004DE0000-0x0000000004DE1000-memory.dmp

    Filesize

    4KB

  • memory/3036-30-0x0000000004850000-0x0000000004851000-memory.dmp

    Filesize

    4KB

  • memory/3036-133-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3036-131-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3036-129-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3036-51-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3036-127-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3036-125-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3036-123-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3036-121-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3036-119-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3036-117-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3036-115-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3036-37-0x0000000004EB0000-0x0000000004EB2000-memory.dmp

    Filesize

    8KB

  • memory/3036-113-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3036-111-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3036-109-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3036-29-0x0000000004D90000-0x0000000004D91000-memory.dmp

    Filesize

    4KB

  • memory/3036-24-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3036-68-0x0000000074760000-0x00000000748BD000-memory.dmp

    Filesize

    1.4MB

  • memory/3036-107-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3036-22-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3304-114-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3304-130-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3304-76-0x0000000005170000-0x0000000005171000-memory.dmp

    Filesize

    4KB

  • memory/3304-77-0x0000000005140000-0x0000000005141000-memory.dmp

    Filesize

    4KB

  • memory/3304-78-0x00000000051C0000-0x00000000051C1000-memory.dmp

    Filesize

    4KB

  • memory/3304-134-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3304-79-0x0000000005160000-0x0000000005161000-memory.dmp

    Filesize

    4KB

  • memory/3304-82-0x00000000051E0000-0x00000000051E2000-memory.dmp

    Filesize

    8KB

  • memory/3304-81-0x00000000051B0000-0x00000000051B1000-memory.dmp

    Filesize

    4KB

  • memory/3304-83-0x0000000005290000-0x0000000005292000-memory.dmp

    Filesize

    8KB

  • memory/3304-85-0x0000000005180000-0x0000000005181000-memory.dmp

    Filesize

    4KB

  • memory/3304-84-0x00000000051A0000-0x00000000051A1000-memory.dmp

    Filesize

    4KB

  • memory/3304-132-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3304-112-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3304-128-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3304-126-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3304-124-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3304-74-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3304-122-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3304-120-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3304-70-0x0000000074760000-0x00000000748BD000-memory.dmp

    Filesize

    1.4MB

  • memory/3304-69-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3304-108-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3304-118-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3304-110-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3304-116-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3352-52-0x0000000004DD0000-0x0000000004DD1000-memory.dmp

    Filesize

    4KB

  • memory/3352-89-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3352-61-0x0000000004D90000-0x0000000004D91000-memory.dmp

    Filesize

    4KB

  • memory/3352-60-0x0000000004DA0000-0x0000000004DA1000-memory.dmp

    Filesize

    4KB

  • memory/3352-63-0x0000000004D80000-0x0000000004D81000-memory.dmp

    Filesize

    4KB

  • memory/3352-56-0x0000000004DC0000-0x0000000004DC1000-memory.dmp

    Filesize

    4KB

  • memory/3352-65-0x0000000004DB0000-0x0000000004DB1000-memory.dmp

    Filesize

    4KB

  • memory/3352-59-0x0000000004EA0000-0x0000000004EA2000-memory.dmp

    Filesize

    8KB

  • memory/3352-99-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3352-58-0x0000000004DF0000-0x0000000004DF2000-memory.dmp

    Filesize

    8KB

  • memory/3352-72-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3352-45-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3352-86-0x0000000074760000-0x00000000748BD000-memory.dmp

    Filesize

    1.4MB

  • memory/3352-57-0x0000000004D70000-0x0000000004D71000-memory.dmp

    Filesize

    4KB

  • memory/3352-46-0x0000000074760000-0x00000000748BD000-memory.dmp

    Filesize

    1.4MB

  • memory/3352-55-0x0000000004D50000-0x0000000004D51000-memory.dmp

    Filesize

    4KB

  • memory/3352-66-0x0000000004D60000-0x0000000004D61000-memory.dmp

    Filesize

    4KB

  • memory/3352-48-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3472-87-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3472-92-0x0000000074760000-0x00000000748BD000-memory.dmp

    Filesize

    1.4MB

  • memory/3472-93-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3472-94-0x0000000004DF0000-0x0000000004DF1000-memory.dmp

    Filesize

    4KB

  • memory/3472-97-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB