Analysis

  • max time kernel
    152s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/11/2023, 11:01

General

  • Target

    NEAS.0244238a3a21dcf0975cf7b2b508a900.exe

  • Size

    1.7MB

  • MD5

    0244238a3a21dcf0975cf7b2b508a900

  • SHA1

    d207c3f86059f1cdb0408b4c24c7dd4502d21d3f

  • SHA256

    16f6c062d2acad659fb3bda3d0e8fe0de8d8bc4d46db435d0be10cef7127915a

  • SHA512

    45d82ffa81c6bdf571c20b7583c4e97fe92d70c1c99eb07cded1bce45a56153c3788beda65749baabf45c574b6f2c122f783a88127f6a10d30138011682fabaa

  • SSDEEP

    49152:DpPNiqTVoiCVsqSMRrQFTAm4o24TduMpwNRe:NNiqpcsFCrQFEm40vpwi

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 5 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.0244238a3a21dcf0975cf7b2b508a900.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.0244238a3a21dcf0975cf7b2b508a900.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1892
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4732
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4968
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3988
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetWindowsHookEx
            PID:1668
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetWindowsHookEx
        PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    1.7MB

    MD5

    2b124028fb7aa6d3f173fd401c51ef4a

    SHA1

    b1aa882f928aa6cb5c18362a3f7ffd6b2da7d5c3

    SHA256

    ce1b41bb8046f8c35f5920391b2d68d9e76d6ab1f5748ca5ba1084ead8c61646

    SHA512

    87bdbab1831c66b428405eeb3f9f510c7ad336b0331d911a1b1328c819d244efadf995506b3f25e82139388055d32ddf7cb90e6609bab4361496de293c46e14d

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    1.7MB

    MD5

    de4d2a7e49cc805abc1bf1ae99ca53ac

    SHA1

    08c3db03a6c7e46bd430cca3fe5970904d22e9e9

    SHA256

    ced174edf22836db99fdfa66e69b6c0dcdeec82b1cf8a4b426affbee376c106d

    SHA512

    8e8fe3a05f9072cb7e30f949bc27fd6965453a805e785355b16217eb7ee79d638c3bd47453092ac9f4768a63f7d41f6242cbcfa1e9ecfa9eca92dafe0b86dddf

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    1.7MB

    MD5

    de4d2a7e49cc805abc1bf1ae99ca53ac

    SHA1

    08c3db03a6c7e46bd430cca3fe5970904d22e9e9

    SHA256

    ced174edf22836db99fdfa66e69b6c0dcdeec82b1cf8a4b426affbee376c106d

    SHA512

    8e8fe3a05f9072cb7e30f949bc27fd6965453a805e785355b16217eb7ee79d638c3bd47453092ac9f4768a63f7d41f6242cbcfa1e9ecfa9eca92dafe0b86dddf

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    1.7MB

    MD5

    de4d2a7e49cc805abc1bf1ae99ca53ac

    SHA1

    08c3db03a6c7e46bd430cca3fe5970904d22e9e9

    SHA256

    ced174edf22836db99fdfa66e69b6c0dcdeec82b1cf8a4b426affbee376c106d

    SHA512

    8e8fe3a05f9072cb7e30f949bc27fd6965453a805e785355b16217eb7ee79d638c3bd47453092ac9f4768a63f7d41f6242cbcfa1e9ecfa9eca92dafe0b86dddf

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    1.7MB

    MD5

    de4d2a7e49cc805abc1bf1ae99ca53ac

    SHA1

    08c3db03a6c7e46bd430cca3fe5970904d22e9e9

    SHA256

    ced174edf22836db99fdfa66e69b6c0dcdeec82b1cf8a4b426affbee376c106d

    SHA512

    8e8fe3a05f9072cb7e30f949bc27fd6965453a805e785355b16217eb7ee79d638c3bd47453092ac9f4768a63f7d41f6242cbcfa1e9ecfa9eca92dafe0b86dddf

  • C:\Windows\Resources\svchost.exe

    Filesize

    1.7MB

    MD5

    0a3b3fc11baaa86e4ad4a36f33b673e2

    SHA1

    ce036a691ba4599673dca28b2ca0e49fac3fc411

    SHA256

    5c15b4dfe2e9db4b0587ec95f3b3e354f24e26a232e5b7be08bb8ea6c856f63c

    SHA512

    c5fcf3c936a13ecb404be61b1132ee49a76023781dee621785d95a05dca3dd399e2d0b96a54c323f1bfe339fce18a2fc1324565d13889916137a616ab4b357d3

  • \??\c:\windows\resources\spoolsv.exe

    Filesize

    1.7MB

    MD5

    de4d2a7e49cc805abc1bf1ae99ca53ac

    SHA1

    08c3db03a6c7e46bd430cca3fe5970904d22e9e9

    SHA256

    ced174edf22836db99fdfa66e69b6c0dcdeec82b1cf8a4b426affbee376c106d

    SHA512

    8e8fe3a05f9072cb7e30f949bc27fd6965453a805e785355b16217eb7ee79d638c3bd47453092ac9f4768a63f7d41f6242cbcfa1e9ecfa9eca92dafe0b86dddf

  • \??\c:\windows\resources\svchost.exe

    Filesize

    1.7MB

    MD5

    0a3b3fc11baaa86e4ad4a36f33b673e2

    SHA1

    ce036a691ba4599673dca28b2ca0e49fac3fc411

    SHA256

    5c15b4dfe2e9db4b0587ec95f3b3e354f24e26a232e5b7be08bb8ea6c856f63c

    SHA512

    c5fcf3c936a13ecb404be61b1132ee49a76023781dee621785d95a05dca3dd399e2d0b96a54c323f1bfe339fce18a2fc1324565d13889916137a616ab4b357d3

  • \??\c:\windows\resources\themes\explorer.exe

    Filesize

    1.7MB

    MD5

    2b124028fb7aa6d3f173fd401c51ef4a

    SHA1

    b1aa882f928aa6cb5c18362a3f7ffd6b2da7d5c3

    SHA256

    ce1b41bb8046f8c35f5920391b2d68d9e76d6ab1f5748ca5ba1084ead8c61646

    SHA512

    87bdbab1831c66b428405eeb3f9f510c7ad336b0331d911a1b1328c819d244efadf995506b3f25e82139388055d32ddf7cb90e6609bab4361496de293c46e14d

  • memory/1668-117-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/1892-12-0x0000000004DC0000-0x0000000004DC1000-memory.dmp

    Filesize

    4KB

  • memory/1892-9-0x0000000004D60000-0x0000000004D61000-memory.dmp

    Filesize

    4KB

  • memory/1892-16-0x0000000004E20000-0x0000000004E22000-memory.dmp

    Filesize

    8KB

  • memory/1892-15-0x0000000004DB0000-0x0000000004DB1000-memory.dmp

    Filesize

    4KB

  • memory/1892-19-0x0000000004D70000-0x0000000004D71000-memory.dmp

    Filesize

    4KB

  • memory/1892-10-0x0000000004DD0000-0x0000000004DD1000-memory.dmp

    Filesize

    4KB

  • memory/1892-14-0x0000000004E70000-0x0000000004E72000-memory.dmp

    Filesize

    8KB

  • memory/1892-13-0x0000000004DF0000-0x0000000004DF2000-memory.dmp

    Filesize

    8KB

  • memory/1892-24-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/1892-11-0x0000000004D80000-0x0000000004D81000-memory.dmp

    Filesize

    4KB

  • memory/1892-53-0x00000000751F0000-0x000000007534D000-memory.dmp

    Filesize

    1.4MB

  • memory/1892-8-0x0000000004D90000-0x0000000004D91000-memory.dmp

    Filesize

    4KB

  • memory/1892-6-0x0000000004DE0000-0x0000000004DE1000-memory.dmp

    Filesize

    4KB

  • memory/1892-50-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/1892-0-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/1892-4-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/1892-46-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/1892-2-0x00000000751F0000-0x000000007534D000-memory.dmp

    Filesize

    1.4MB

  • memory/1892-1-0x0000000077E24000-0x0000000077E26000-memory.dmp

    Filesize

    8KB

  • memory/1892-41-0x00000000751F0000-0x000000007534D000-memory.dmp

    Filesize

    1.4MB

  • memory/2532-54-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/2532-93-0x00000000751F0000-0x000000007534D000-memory.dmp

    Filesize

    1.4MB

  • memory/2532-79-0x00000000751F0000-0x000000007534D000-memory.dmp

    Filesize

    1.4MB

  • memory/2532-81-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/2532-87-0x0000000004DD0000-0x0000000004DD1000-memory.dmp

    Filesize

    4KB

  • memory/2532-88-0x0000000004E00000-0x0000000004E01000-memory.dmp

    Filesize

    4KB

  • memory/2532-89-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/2532-92-0x0000000004850000-0x0000000004851000-memory.dmp

    Filesize

    4KB

  • memory/3988-135-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3988-137-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3988-141-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3988-98-0x00000000051C0000-0x00000000051C1000-memory.dmp

    Filesize

    4KB

  • memory/3988-143-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3988-145-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3988-99-0x0000000005160000-0x0000000005161000-memory.dmp

    Filesize

    4KB

  • memory/3988-97-0x0000000005140000-0x0000000005141000-memory.dmp

    Filesize

    4KB

  • memory/3988-95-0x0000000005170000-0x0000000005171000-memory.dmp

    Filesize

    4KB

  • memory/3988-139-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3988-125-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3988-133-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3988-147-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3988-131-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3988-129-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3988-86-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3988-83-0x00000000751F0000-0x000000007534D000-memory.dmp

    Filesize

    1.4MB

  • memory/3988-127-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3988-119-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/3988-77-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4732-112-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4732-134-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4732-23-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4732-146-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4732-25-0x00000000751F0000-0x000000007534D000-memory.dmp

    Filesize

    1.4MB

  • memory/4732-144-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4732-28-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4732-142-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4732-30-0x0000000004D90000-0x0000000004D91000-memory.dmp

    Filesize

    4KB

  • memory/4732-140-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4732-31-0x0000000004850000-0x0000000004851000-memory.dmp

    Filesize

    4KB

  • memory/4732-138-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4732-33-0x0000000004D80000-0x0000000004D81000-memory.dmp

    Filesize

    4KB

  • memory/4732-136-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4732-32-0x0000000004DE0000-0x0000000004DE1000-memory.dmp

    Filesize

    4KB

  • memory/4732-34-0x0000000004DD0000-0x0000000004DD1000-memory.dmp

    Filesize

    4KB

  • memory/4732-57-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4732-132-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4732-49-0x00000000751F0000-0x000000007534D000-memory.dmp

    Filesize

    1.4MB

  • memory/4732-48-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4732-37-0x0000000004E00000-0x0000000004E02000-memory.dmp

    Filesize

    8KB

  • memory/4732-47-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4732-130-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4732-42-0x0000000004D70000-0x0000000004D71000-memory.dmp

    Filesize

    4KB

  • memory/4732-124-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4732-40-0x0000000004DA0000-0x0000000004DA1000-memory.dmp

    Filesize

    4KB

  • memory/4732-126-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4732-39-0x0000000004DC0000-0x0000000004DC1000-memory.dmp

    Filesize

    4KB

  • memory/4732-128-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4732-38-0x0000000004EB0000-0x0000000004EB2000-memory.dmp

    Filesize

    8KB

  • memory/4968-118-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4968-116-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4968-52-0x00000000751F0000-0x000000007534D000-memory.dmp

    Filesize

    1.4MB

  • memory/4968-58-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4968-72-0x0000000004E00000-0x0000000004E02000-memory.dmp

    Filesize

    8KB

  • memory/4968-94-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4968-59-0x0000000004DE0000-0x0000000004DE1000-memory.dmp

    Filesize

    4KB

  • memory/4968-63-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4968-64-0x0000000004D90000-0x0000000004D91000-memory.dmp

    Filesize

    4KB

  • memory/4968-65-0x0000000004D60000-0x0000000004D61000-memory.dmp

    Filesize

    4KB

  • memory/4968-90-0x00000000751F0000-0x000000007534D000-memory.dmp

    Filesize

    1.4MB

  • memory/4968-68-0x0000000004DD0000-0x0000000004DD1000-memory.dmp

    Filesize

    4KB

  • memory/4968-70-0x0000000004D80000-0x0000000004D81000-memory.dmp

    Filesize

    4KB

  • memory/4968-71-0x0000000004DC0000-0x0000000004DC1000-memory.dmp

    Filesize

    4KB

  • memory/4968-73-0x0000000004EA0000-0x0000000004EA2000-memory.dmp

    Filesize

    8KB

  • memory/4968-75-0x0000000004DA0000-0x0000000004DA1000-memory.dmp

    Filesize

    4KB

  • memory/4968-74-0x0000000004DB0000-0x0000000004DB1000-memory.dmp

    Filesize

    4KB

  • memory/4968-76-0x0000000004D70000-0x0000000004D71000-memory.dmp

    Filesize

    4KB