Analysis
-
max time kernel
157s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2023 02:35
Behavioral task
behavioral1
Sample
NEAS.098aeeead8bcc2fc053a4a7af5db4190.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.098aeeead8bcc2fc053a4a7af5db4190.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.098aeeead8bcc2fc053a4a7af5db4190.exe
-
Size
2.5MB
-
MD5
098aeeead8bcc2fc053a4a7af5db4190
-
SHA1
717d879bd4178c857c94c34f2f517193ca8460f6
-
SHA256
2e24bbb3773c2d0fab2156685298b7c4adf96c22790beab3be80226995954b51
-
SHA512
c2301e55402b6107a70018b07d398c599b86279faec0a8f484efc76162317b935e653ae3d8173e050e321ea9226e06cf426d58cfe3e124719c1e61677599d0d1
-
SSDEEP
49152:y4daOqAehx7x20RKuniOJqfU7F1tLYoNovTE3pzNx0FOnpe4v/681:cP7tRtrJq88SqgnpXiu
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ NEAS.098aeeead8bcc2fc053a4a7af5db4190.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ecxnjia.exe -
Modifies AppInit DLL entries 2 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ecxnjia.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ecxnjia.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion NEAS.098aeeead8bcc2fc053a4a7af5db4190.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion NEAS.098aeeead8bcc2fc053a4a7af5db4190.exe -
Executes dropped EXE 1 IoCs
pid Process 932 ecxnjia.exe -
resource yara_rule behavioral2/memory/4872-0-0x0000000000400000-0x0000000000A57000-memory.dmp themida behavioral2/memory/4872-1-0x0000000000400000-0x0000000000A57000-memory.dmp themida behavioral2/memory/4872-2-0x0000000000400000-0x0000000000A57000-memory.dmp themida behavioral2/files/0x0006000000022df6-9.dat themida behavioral2/files/0x0006000000022df6-10.dat themida behavioral2/memory/932-14-0x0000000000400000-0x0000000000A57000-memory.dmp themida behavioral2/memory/932-15-0x0000000000400000-0x0000000000A57000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NEAS.098aeeead8bcc2fc053a4a7af5db4190.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ecxnjia.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\qxogatk.dll ecxnjia.exe File created C:\PROGRA~3\Mozilla\ecxnjia.exe NEAS.098aeeead8bcc2fc053a4a7af5db4190.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.098aeeead8bcc2fc053a4a7af5db4190.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.098aeeead8bcc2fc053a4a7af5db4190.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Program Files directory
PID:4872
-
C:\PROGRA~3\Mozilla\ecxnjia.exeC:\PROGRA~3\Mozilla\ecxnjia.exe -goglxbn1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
PID:932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5329534b066b3cce97c1a7722eb1b4b4d
SHA1d596c59206f737ceae75b70b2824478b24a84e84
SHA25680dcd2823c94ffe1f91ff70d2b30ac8c57053f7f5f62775ce37784a816527341
SHA51267939352aa6c6640bd8b83ea77352f1b22e53e2e493dc9bed20c8aae0786e83acabf1c9c2ff4fcb48ec71d5b78917121fef93ebb25c691c21802847bc11fd620
-
Filesize
2.5MB
MD5329534b066b3cce97c1a7722eb1b4b4d
SHA1d596c59206f737ceae75b70b2824478b24a84e84
SHA25680dcd2823c94ffe1f91ff70d2b30ac8c57053f7f5f62775ce37784a816527341
SHA51267939352aa6c6640bd8b83ea77352f1b22e53e2e493dc9bed20c8aae0786e83acabf1c9c2ff4fcb48ec71d5b78917121fef93ebb25c691c21802847bc11fd620