Analysis
-
max time kernel
152s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2023, 11:01
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0244238a3a21dcf0975cf7b2b508a900.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.0244238a3a21dcf0975cf7b2b508a900.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.0244238a3a21dcf0975cf7b2b508a900.exe
-
Size
1.7MB
-
MD5
0244238a3a21dcf0975cf7b2b508a900
-
SHA1
d207c3f86059f1cdb0408b4c24c7dd4502d21d3f
-
SHA256
16f6c062d2acad659fb3bda3d0e8fe0de8d8bc4d46db435d0be10cef7127915a
-
SHA512
45d82ffa81c6bdf571c20b7583c4e97fe92d70c1c99eb07cded1bce45a56153c3788beda65749baabf45c574b6f2c122f783a88127f6a10d30138011682fabaa
-
SSDEEP
49152:DpPNiqTVoiCVsqSMRrQFTAm4o24TduMpwNRe:NNiqpcsFCrQFEm40vpwi
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ NEAS.0244238a3a21dcf0975cf7b2b508a900.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion NEAS.0244238a3a21dcf0975cf7b2b508a900.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion NEAS.0244238a3a21dcf0975cf7b2b508a900.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe -
Executes dropped EXE 5 IoCs
pid Process 4732 explorer.exe 4968 spoolsv.exe 2532 spoolsv.exe 3988 svchost.exe 1668 spoolsv.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Software\Wine spoolsv.exe Key opened \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Software\Wine spoolsv.exe Key opened \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Software\Wine svchost.exe Key opened \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Software\Wine spoolsv.exe Key opened \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Software\Wine NEAS.0244238a3a21dcf0975cf7b2b508a900.exe Key opened \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Software\Wine explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 4732 explorer.exe 4968 spoolsv.exe 2532 spoolsv.exe 3988 svchost.exe 1668 spoolsv.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe NEAS.0244238a3a21dcf0975cf7b2b508a900.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe 4732 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4732 explorer.exe 3988 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 4732 explorer.exe 4732 explorer.exe 4968 spoolsv.exe 4968 spoolsv.exe 2532 spoolsv.exe 3988 svchost.exe 2532 spoolsv.exe 3988 svchost.exe 1668 spoolsv.exe 1668 spoolsv.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1892 wrote to memory of 4732 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 89 PID 1892 wrote to memory of 4732 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 89 PID 1892 wrote to memory of 4732 1892 NEAS.0244238a3a21dcf0975cf7b2b508a900.exe 89 PID 4732 wrote to memory of 4968 4732 explorer.exe 90 PID 4732 wrote to memory of 4968 4732 explorer.exe 90 PID 4732 wrote to memory of 4968 4732 explorer.exe 90 PID 4732 wrote to memory of 2532 4732 explorer.exe 91 PID 4732 wrote to memory of 2532 4732 explorer.exe 91 PID 4732 wrote to memory of 2532 4732 explorer.exe 91 PID 4968 wrote to memory of 3988 4968 spoolsv.exe 92 PID 4968 wrote to memory of 3988 4968 spoolsv.exe 92 PID 4968 wrote to memory of 3988 4968 spoolsv.exe 92 PID 3988 wrote to memory of 1668 3988 svchost.exe 93 PID 3988 wrote to memory of 1668 3988 svchost.exe 93 PID 3988 wrote to memory of 1668 3988 svchost.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.0244238a3a21dcf0975cf7b2b508a900.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.0244238a3a21dcf0975cf7b2b508a900.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1892 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4732 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4968 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3988 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:1668
-
-
-
-
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2532
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD52b124028fb7aa6d3f173fd401c51ef4a
SHA1b1aa882f928aa6cb5c18362a3f7ffd6b2da7d5c3
SHA256ce1b41bb8046f8c35f5920391b2d68d9e76d6ab1f5748ca5ba1084ead8c61646
SHA51287bdbab1831c66b428405eeb3f9f510c7ad336b0331d911a1b1328c819d244efadf995506b3f25e82139388055d32ddf7cb90e6609bab4361496de293c46e14d
-
Filesize
1.7MB
MD5de4d2a7e49cc805abc1bf1ae99ca53ac
SHA108c3db03a6c7e46bd430cca3fe5970904d22e9e9
SHA256ced174edf22836db99fdfa66e69b6c0dcdeec82b1cf8a4b426affbee376c106d
SHA5128e8fe3a05f9072cb7e30f949bc27fd6965453a805e785355b16217eb7ee79d638c3bd47453092ac9f4768a63f7d41f6242cbcfa1e9ecfa9eca92dafe0b86dddf
-
Filesize
1.7MB
MD5de4d2a7e49cc805abc1bf1ae99ca53ac
SHA108c3db03a6c7e46bd430cca3fe5970904d22e9e9
SHA256ced174edf22836db99fdfa66e69b6c0dcdeec82b1cf8a4b426affbee376c106d
SHA5128e8fe3a05f9072cb7e30f949bc27fd6965453a805e785355b16217eb7ee79d638c3bd47453092ac9f4768a63f7d41f6242cbcfa1e9ecfa9eca92dafe0b86dddf
-
Filesize
1.7MB
MD5de4d2a7e49cc805abc1bf1ae99ca53ac
SHA108c3db03a6c7e46bd430cca3fe5970904d22e9e9
SHA256ced174edf22836db99fdfa66e69b6c0dcdeec82b1cf8a4b426affbee376c106d
SHA5128e8fe3a05f9072cb7e30f949bc27fd6965453a805e785355b16217eb7ee79d638c3bd47453092ac9f4768a63f7d41f6242cbcfa1e9ecfa9eca92dafe0b86dddf
-
Filesize
1.7MB
MD5de4d2a7e49cc805abc1bf1ae99ca53ac
SHA108c3db03a6c7e46bd430cca3fe5970904d22e9e9
SHA256ced174edf22836db99fdfa66e69b6c0dcdeec82b1cf8a4b426affbee376c106d
SHA5128e8fe3a05f9072cb7e30f949bc27fd6965453a805e785355b16217eb7ee79d638c3bd47453092ac9f4768a63f7d41f6242cbcfa1e9ecfa9eca92dafe0b86dddf
-
Filesize
1.7MB
MD50a3b3fc11baaa86e4ad4a36f33b673e2
SHA1ce036a691ba4599673dca28b2ca0e49fac3fc411
SHA2565c15b4dfe2e9db4b0587ec95f3b3e354f24e26a232e5b7be08bb8ea6c856f63c
SHA512c5fcf3c936a13ecb404be61b1132ee49a76023781dee621785d95a05dca3dd399e2d0b96a54c323f1bfe339fce18a2fc1324565d13889916137a616ab4b357d3
-
Filesize
1.7MB
MD5de4d2a7e49cc805abc1bf1ae99ca53ac
SHA108c3db03a6c7e46bd430cca3fe5970904d22e9e9
SHA256ced174edf22836db99fdfa66e69b6c0dcdeec82b1cf8a4b426affbee376c106d
SHA5128e8fe3a05f9072cb7e30f949bc27fd6965453a805e785355b16217eb7ee79d638c3bd47453092ac9f4768a63f7d41f6242cbcfa1e9ecfa9eca92dafe0b86dddf
-
Filesize
1.7MB
MD50a3b3fc11baaa86e4ad4a36f33b673e2
SHA1ce036a691ba4599673dca28b2ca0e49fac3fc411
SHA2565c15b4dfe2e9db4b0587ec95f3b3e354f24e26a232e5b7be08bb8ea6c856f63c
SHA512c5fcf3c936a13ecb404be61b1132ee49a76023781dee621785d95a05dca3dd399e2d0b96a54c323f1bfe339fce18a2fc1324565d13889916137a616ab4b357d3
-
Filesize
1.7MB
MD52b124028fb7aa6d3f173fd401c51ef4a
SHA1b1aa882f928aa6cb5c18362a3f7ffd6b2da7d5c3
SHA256ce1b41bb8046f8c35f5920391b2d68d9e76d6ab1f5748ca5ba1084ead8c61646
SHA51287bdbab1831c66b428405eeb3f9f510c7ad336b0331d911a1b1328c819d244efadf995506b3f25e82139388055d32ddf7cb90e6609bab4361496de293c46e14d