Analysis
-
max time kernel
136s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2023 17:25
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe
Resource
win7-20231020-en
General
-
Target
NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe
-
Size
5.5MB
-
MD5
a61aac13f8a4841915791fb57aa2e275
-
SHA1
c34330fb238e0b9ea1cca921e42fb46966e1d577
-
SHA256
f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb
-
SHA512
9ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f
-
SSDEEP
98304:YF85vlOC7s2wQPc8V94nWFQO0R6dheB4/ncnREmThJ45aTyFXBuirxD02g9rX:COvPgZeORpR67e4/ncRZTQXBFrWd
Malware Config
Signatures
-
Detect ZGRat V1 4 IoCs
resource yara_rule behavioral2/files/0x0006000000022cef-63.dat family_zgrat_v1 behavioral2/files/0x0006000000022cef-74.dat family_zgrat_v1 behavioral2/files/0x0006000000022cef-75.dat family_zgrat_v1 behavioral2/memory/3848-76-0x00000000005A0000-0x00000000008BA000-memory.dmp family_zgrat_v1 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ clpch.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ XRJNZC.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion clpch.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion clpch.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XRJNZC.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation Utsysc.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation clpch.exe -
Executes dropped EXE 6 IoCs
pid Process 2680 Utsysc.exe 1124 Utsysc.exe 3848 mnr.exe 4192 clpch.exe 692 XRJNZC.exe 3044 Utsysc.exe -
resource yara_rule behavioral2/files/0x0007000000022d07-86.dat themida behavioral2/files/0x0007000000022d07-99.dat themida behavioral2/files/0x0007000000022d07-100.dat themida behavioral2/memory/4192-101-0x0000000000D00000-0x0000000001B66000-memory.dmp themida behavioral2/memory/4192-106-0x0000000000D00000-0x0000000001B66000-memory.dmp themida behavioral2/memory/4192-109-0x0000000000D00000-0x0000000001B66000-memory.dmp themida behavioral2/memory/4192-114-0x0000000000D00000-0x0000000001B66000-memory.dmp themida behavioral2/memory/4192-115-0x0000000000D00000-0x0000000001B66000-memory.dmp themida behavioral2/memory/4192-116-0x0000000000D00000-0x0000000001B66000-memory.dmp themida behavioral2/memory/4192-117-0x0000000000D00000-0x0000000001B66000-memory.dmp themida behavioral2/memory/4192-118-0x0000000000D00000-0x0000000001B66000-memory.dmp themida behavioral2/memory/4192-124-0x0000000000D00000-0x0000000001B66000-memory.dmp themida behavioral2/files/0x0007000000022d19-127.dat themida behavioral2/files/0x0007000000022d19-128.dat themida behavioral2/memory/692-129-0x00000000009E0000-0x0000000001846000-memory.dmp themida behavioral2/memory/692-135-0x00000000009E0000-0x0000000001846000-memory.dmp themida behavioral2/memory/692-141-0x00000000009E0000-0x0000000001846000-memory.dmp themida behavioral2/memory/692-142-0x00000000009E0000-0x0000000001846000-memory.dmp themida behavioral2/memory/692-143-0x00000000009E0000-0x0000000001846000-memory.dmp themida behavioral2/memory/692-144-0x00000000009E0000-0x0000000001846000-memory.dmp themida behavioral2/memory/692-145-0x00000000009E0000-0x0000000001846000-memory.dmp themida behavioral2/memory/692-146-0x00000000009E0000-0x0000000001846000-memory.dmp themida behavioral2/memory/692-147-0x00000000009E0000-0x0000000001846000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mnr.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000057001\\mnr.exe" Utsysc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clpch.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000058001\\clpch.exe" Utsysc.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA clpch.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XRJNZC.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4192 clpch.exe 692 XRJNZC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2452 692 WerFault.exe 119 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4920 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2908 timeout.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 4816 NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe 4816 NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe 2680 Utsysc.exe 2680 Utsysc.exe 1124 Utsysc.exe 1124 Utsysc.exe 3848 mnr.exe 4192 clpch.exe 4192 clpch.exe 692 XRJNZC.exe 692 XRJNZC.exe 3044 Utsysc.exe 3044 Utsysc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3848 mnr.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4816 NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4816 wrote to memory of 2680 4816 NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe 99 PID 4816 wrote to memory of 2680 4816 NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe 99 PID 4816 wrote to memory of 2680 4816 NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe 99 PID 2680 wrote to memory of 4920 2680 Utsysc.exe 101 PID 2680 wrote to memory of 4920 2680 Utsysc.exe 101 PID 2680 wrote to memory of 4920 2680 Utsysc.exe 101 PID 2680 wrote to memory of 3848 2680 Utsysc.exe 113 PID 2680 wrote to memory of 3848 2680 Utsysc.exe 113 PID 2680 wrote to memory of 4192 2680 Utsysc.exe 115 PID 2680 wrote to memory of 4192 2680 Utsysc.exe 115 PID 2680 wrote to memory of 4192 2680 Utsysc.exe 115 PID 4192 wrote to memory of 1116 4192 clpch.exe 116 PID 4192 wrote to memory of 1116 4192 clpch.exe 116 PID 4192 wrote to memory of 1116 4192 clpch.exe 116 PID 1116 wrote to memory of 2908 1116 cmd.exe 118 PID 1116 wrote to memory of 2908 1116 cmd.exe 118 PID 1116 wrote to memory of 2908 1116 cmd.exe 118 PID 1116 wrote to memory of 692 1116 cmd.exe 119 PID 1116 wrote to memory of 692 1116 cmd.exe 119 PID 1116 wrote to memory of 692 1116 cmd.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:4920
-
-
C:\Users\Admin\AppData\Local\Temp\1000057001\mnr.exe"C:\Users\Admin\AppData\Local\Temp\1000057001\mnr.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
-
C:\Users\Admin\AppData\Local\Temp\1000058001\clpch.exe"C:\Users\Admin\AppData\Local\Temp\1000058001\clpch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\s38g.0.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
PID:2908
-
-
C:\ProgramData\pinterests\XRJNZC.exe"C:\ProgramData\pinterests\XRJNZC.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 692 -s 6326⤵
- Program crash
PID:2452
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 692 -ip 6921⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3044
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.6MB
MD5a0e1fed1f09771f2bf3538fa41fac6ab
SHA1204c2d8a1d9590db0a9e9c4e628bad8024527ed8
SHA256dd419c5bf49b28b78b0c45ab00411bae560a264001138395bd5e41601efdcd44
SHA5121a62bfeb959f9a8aa737ee923d43d1be425bf4434ab898a2fced7d50f763a15a950be8d3cd732b8366a413ece9fdfb2e7a4565e7fb83d7cb212b7f366b89b159
-
Filesize
5.6MB
MD5a0e1fed1f09771f2bf3538fa41fac6ab
SHA1204c2d8a1d9590db0a9e9c4e628bad8024527ed8
SHA256dd419c5bf49b28b78b0c45ab00411bae560a264001138395bd5e41601efdcd44
SHA5121a62bfeb959f9a8aa737ee923d43d1be425bf4434ab898a2fced7d50f763a15a950be8d3cd732b8366a413ece9fdfb2e7a4565e7fb83d7cb212b7f366b89b159
-
Filesize
3.1MB
MD50a501e5abacadb4be16dfd88077b9a13
SHA123c81dd0e177be64b95b8815cf1ec492f2bb106e
SHA256bc2431479cb69bab7792a354293de3a085507d8ab6a46f614a13cda5943e97f8
SHA5128390b3754b48b00fe7b16583e1cf236d896594e4a26854ecf0e1fef402e86cd927afcfaf2120f699ecdcc3b5d8031c618723f43aed09fd5fa8575bdc907b6838
-
Filesize
3.1MB
MD50a501e5abacadb4be16dfd88077b9a13
SHA123c81dd0e177be64b95b8815cf1ec492f2bb106e
SHA256bc2431479cb69bab7792a354293de3a085507d8ab6a46f614a13cda5943e97f8
SHA5128390b3754b48b00fe7b16583e1cf236d896594e4a26854ecf0e1fef402e86cd927afcfaf2120f699ecdcc3b5d8031c618723f43aed09fd5fa8575bdc907b6838
-
Filesize
3.1MB
MD50a501e5abacadb4be16dfd88077b9a13
SHA123c81dd0e177be64b95b8815cf1ec492f2bb106e
SHA256bc2431479cb69bab7792a354293de3a085507d8ab6a46f614a13cda5943e97f8
SHA5128390b3754b48b00fe7b16583e1cf236d896594e4a26854ecf0e1fef402e86cd927afcfaf2120f699ecdcc3b5d8031c618723f43aed09fd5fa8575bdc907b6838
-
Filesize
5.6MB
MD5a0e1fed1f09771f2bf3538fa41fac6ab
SHA1204c2d8a1d9590db0a9e9c4e628bad8024527ed8
SHA256dd419c5bf49b28b78b0c45ab00411bae560a264001138395bd5e41601efdcd44
SHA5121a62bfeb959f9a8aa737ee923d43d1be425bf4434ab898a2fced7d50f763a15a950be8d3cd732b8366a413ece9fdfb2e7a4565e7fb83d7cb212b7f366b89b159
-
Filesize
5.6MB
MD5a0e1fed1f09771f2bf3538fa41fac6ab
SHA1204c2d8a1d9590db0a9e9c4e628bad8024527ed8
SHA256dd419c5bf49b28b78b0c45ab00411bae560a264001138395bd5e41601efdcd44
SHA5121a62bfeb959f9a8aa737ee923d43d1be425bf4434ab898a2fced7d50f763a15a950be8d3cd732b8366a413ece9fdfb2e7a4565e7fb83d7cb212b7f366b89b159
-
Filesize
5.6MB
MD5a0e1fed1f09771f2bf3538fa41fac6ab
SHA1204c2d8a1d9590db0a9e9c4e628bad8024527ed8
SHA256dd419c5bf49b28b78b0c45ab00411bae560a264001138395bd5e41601efdcd44
SHA5121a62bfeb959f9a8aa737ee923d43d1be425bf4434ab898a2fced7d50f763a15a950be8d3cd732b8366a413ece9fdfb2e7a4565e7fb83d7cb212b7f366b89b159
-
Filesize
5.5MB
MD5a61aac13f8a4841915791fb57aa2e275
SHA1c34330fb238e0b9ea1cca921e42fb46966e1d577
SHA256f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb
SHA5129ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f
-
Filesize
5.5MB
MD5a61aac13f8a4841915791fb57aa2e275
SHA1c34330fb238e0b9ea1cca921e42fb46966e1d577
SHA256f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb
SHA5129ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f
-
Filesize
5.5MB
MD5a61aac13f8a4841915791fb57aa2e275
SHA1c34330fb238e0b9ea1cca921e42fb46966e1d577
SHA256f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb
SHA5129ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f
-
Filesize
5.5MB
MD5a61aac13f8a4841915791fb57aa2e275
SHA1c34330fb238e0b9ea1cca921e42fb46966e1d577
SHA256f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb
SHA5129ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f
-
Filesize
5.5MB
MD5a61aac13f8a4841915791fb57aa2e275
SHA1c34330fb238e0b9ea1cca921e42fb46966e1d577
SHA256f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb
SHA5129ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f
-
Filesize
176B
MD500db5eb8b243bd2bdac10b0132c509e6
SHA14775c812ea01746a7a6adb2b1e0746c3eee503f5
SHA2562e2bf32281a19dfba48e7d2ffcd2e70476a346f244b37bdf1d1d4debb91d1c94
SHA5127a28637eb7b014f052a67a05faea530b00540b1f1ffe7718d945286c85974664a9eb8953c314b91f1d7e5712242b0f6ce71cce940bf746d444771d19c4aa0076