Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
12/11/2023, 21:27
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe
-
Size
1.7MB
-
MD5
6d56776a0d3b0ae92498cdfa590e8ca0
-
SHA1
23d21c678f6c02b54ab61d6eb20e6e2ff5d47465
-
SHA256
7f21d8dcb9b3613d829ae97526b141b2e4c35cb286a9bdf1a3a1a7e895f03bc9
-
SHA512
521eec1f23769f06698858a43c57d056b3672e6b9b71433073cada9eaf724f0c1f523d324f3583cf29c3f5254495e490eb17eb32b16437a28b84b73a262e6d54
-
SSDEEP
49152:DpPNiqTVoiCVsqSMRrQFTAm4o24TduMpwNRU:NNiqpcsFCrQFEm40vpwQ
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 3036 explorer.exe 3352 spoolsv.exe 3304 svchost.exe 3472 spoolsv.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Software\Wine svchost.exe Key opened \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Software\Wine spoolsv.exe Key opened \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Software\Wine NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe Key opened \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Software\Wine explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Software\Wine spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 3036 explorer.exe 3352 spoolsv.exe 3304 svchost.exe 3472 spoolsv.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe 3036 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3036 explorer.exe 3304 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 3036 explorer.exe 3036 explorer.exe 3352 spoolsv.exe 3352 spoolsv.exe 3304 svchost.exe 3304 svchost.exe 3472 spoolsv.exe 3472 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2272 wrote to memory of 3036 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 89 PID 2272 wrote to memory of 3036 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 89 PID 2272 wrote to memory of 3036 2272 NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe 89 PID 3036 wrote to memory of 3352 3036 explorer.exe 92 PID 3036 wrote to memory of 3352 3036 explorer.exe 92 PID 3036 wrote to memory of 3352 3036 explorer.exe 92 PID 3352 wrote to memory of 3304 3352 spoolsv.exe 93 PID 3352 wrote to memory of 3304 3352 spoolsv.exe 93 PID 3352 wrote to memory of 3304 3352 spoolsv.exe 93 PID 3304 wrote to memory of 3472 3304 svchost.exe 96 PID 3304 wrote to memory of 3472 3304 svchost.exe 96 PID 3304 wrote to memory of 3472 3304 svchost.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6d56776a0d3b0ae92498cdfa590e8ca0.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3352 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3304 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:3472
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5ef12dd3375bb1bc3bd97c188a092edfa
SHA18719852c55dd20040beee12c9da79be5ea2b504a
SHA2568f44d94b9bc35570cb7a7baebd27604c82c32cdcfa622361a3a71d7e22ae7f4f
SHA5121168ecaa50e5df87a21536b946603ce50a2ce2e8d67ae1aa536fe2b6732f7aad805c18fb2ef4dddc8a1bb4a0bc25f05d7a61aa273bbef4d0c2c68a32f48457d0
-
Filesize
1.7MB
MD5247b501cc457f26ed4757bfba700d93d
SHA187ed9620a7d8df3d97cbb308f9d283c7335b11a2
SHA256818653b2b353dd5d02fbefc84b5e355aace483b17f9ce80d97cf56fd9acd12a3
SHA512d5db732d19ff617347c581944a39286eb646310fc1ea726044a73bca5a44f33d7904cbd469373167236a0ca613ced3ddd141ed819190f7779376d1c550e39a19
-
Filesize
1.7MB
MD5247b501cc457f26ed4757bfba700d93d
SHA187ed9620a7d8df3d97cbb308f9d283c7335b11a2
SHA256818653b2b353dd5d02fbefc84b5e355aace483b17f9ce80d97cf56fd9acd12a3
SHA512d5db732d19ff617347c581944a39286eb646310fc1ea726044a73bca5a44f33d7904cbd469373167236a0ca613ced3ddd141ed819190f7779376d1c550e39a19
-
Filesize
1.7MB
MD5247b501cc457f26ed4757bfba700d93d
SHA187ed9620a7d8df3d97cbb308f9d283c7335b11a2
SHA256818653b2b353dd5d02fbefc84b5e355aace483b17f9ce80d97cf56fd9acd12a3
SHA512d5db732d19ff617347c581944a39286eb646310fc1ea726044a73bca5a44f33d7904cbd469373167236a0ca613ced3ddd141ed819190f7779376d1c550e39a19
-
Filesize
1.7MB
MD5d0b2b582216adbb7b47b0e44a2552fad
SHA1fa8656d70a9f12b9a38f9fca550ad37c0861c454
SHA2565d14b2c795eb3b35f40c2d176ff28d7dc9cc77809b50cfb9e9866ea0d870d8c7
SHA512f52c328dfc31146b17990463848b51d8b9101a6fc4629a270788f919ba977b5cdc46517733e83802ec22231c5348850dab82f9d042ca42ab47f2ba175071df34
-
Filesize
1.7MB
MD5247b501cc457f26ed4757bfba700d93d
SHA187ed9620a7d8df3d97cbb308f9d283c7335b11a2
SHA256818653b2b353dd5d02fbefc84b5e355aace483b17f9ce80d97cf56fd9acd12a3
SHA512d5db732d19ff617347c581944a39286eb646310fc1ea726044a73bca5a44f33d7904cbd469373167236a0ca613ced3ddd141ed819190f7779376d1c550e39a19
-
Filesize
1.7MB
MD5d0b2b582216adbb7b47b0e44a2552fad
SHA1fa8656d70a9f12b9a38f9fca550ad37c0861c454
SHA2565d14b2c795eb3b35f40c2d176ff28d7dc9cc77809b50cfb9e9866ea0d870d8c7
SHA512f52c328dfc31146b17990463848b51d8b9101a6fc4629a270788f919ba977b5cdc46517733e83802ec22231c5348850dab82f9d042ca42ab47f2ba175071df34
-
Filesize
1.7MB
MD5ef12dd3375bb1bc3bd97c188a092edfa
SHA18719852c55dd20040beee12c9da79be5ea2b504a
SHA2568f44d94b9bc35570cb7a7baebd27604c82c32cdcfa622361a3a71d7e22ae7f4f
SHA5121168ecaa50e5df87a21536b946603ce50a2ce2e8d67ae1aa536fe2b6732f7aad805c18fb2ef4dddc8a1bb4a0bc25f05d7a61aa273bbef4d0c2c68a32f48457d0