Resubmissions

27-07-2021 18:41

210727-gyn99fknwa 10

27-07-2021 14:59

210727-ba8th9dd76 10

Analysis

  • max time kernel
    1735s
  • max time network
    1838s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    27-07-2021 18:41

General

  • Target

    nady6.dll

  • Size

    1.3MB

  • MD5

    1f45bcf1fb8b7ef74a57d19a371f41cf

  • SHA1

    9b7f346a04f8481c22fb6f8853f76349402a7009

  • SHA256

    aee116011409a5bec7d356bd8f704df0a361fb029bf20178d49e02607798d9a1

  • SHA512

    6cdbc392b650420d9238d7400956fa41ec9ede827576b9023b977e232dd18b3dd72f36082fc6cdb5af7f62868b0bd00e9b718522799467c674efb6202a169f9f

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies registry key 1 TTPs 6 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1208
      • C:\Windows\system32\regsvr32.exe
        regsvr32 /s C:\Users\Admin\AppData\Local\Temp\nady6.dll
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:816
        • C:\Windows\system32\cmd.exe
          cmd /c ping 127.0.0.1 -n 8 & "C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\nady6.dll" mscp ahis & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:792
          • C:\Windows\system32\PING.EXE
            ping 127.0.0.1 -n 8
            4⤵
            • Runs ping.exe
            PID:872
          • C:\Windows\system32\regsvr32.exe
            "C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\nady6.dll" mscp ahis
            4⤵
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:744
            • C:\Windows\system32\cmd.exe
              cmd.exe /c echo %temp%
              5⤵
                PID:1652
              • C:\Windows\system32\cmd.exe
                cmd.exe /c reg.exe add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v RealtechUpdate /t REG_SZ /d "\"C:\Windows\system32\regsvr32.exe\" /s \"C:\Users\Admin\AppData\Local\Temp\Damp\keimjdkhqxa.exe\" mscp arih"
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:428
                • C:\Windows\system32\reg.exe
                  reg.exe add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v RealtechUpdate /t REG_SZ /d "\"C:\Windows\system32\regsvr32.exe\" /s \"C:\Users\Admin\AppData\Local\Temp\Damp\keimjdkhqxa.exe\" mscp arih"
                  6⤵
                  • Adds Run key to start application
                  • Modifies registry key
                  PID:1284
              • C:\Windows\system32\cmd.exe
                cmd /c ping 127.0.0.1 -n 8 & "C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\Damp\keimjdkhqxa.exe" mscp arih & exit
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:1148
                • C:\Windows\system32\PING.EXE
                  ping 127.0.0.1 -n 8
                  6⤵
                  • Runs ping.exe
                  PID:1824
                • C:\Windows\system32\regsvr32.exe
                  "C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\Damp\keimjdkhqxa.exe" mscp arih
                  6⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • Loads dropped DLL
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: CmdExeWriteProcessMemorySpam
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:684
                  • C:\Windows\system32\cmd.exe
                    cmd.exe /c reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths"
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1116
                    • C:\Windows\system32\reg.exe
                      reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths"
                      8⤵
                        PID:748
                    • C:\Windows\system32\cmd.exe
                      cmd.exe /c reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\chrome.exe" /v "Path"
                      7⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1344
                      • C:\Windows\system32\reg.exe
                        reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\chrome.exe" /v "Path"
                        8⤵
                          PID:1952
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" mscp amw fkprm "C:\Users\Admin\AppData\Local\Temp\Damp\keimjdkhqxa.exe"
              2⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:956
              • C:\Windows\system32\cmd.exe
                cmd.exe /c reg.exe query HKCU\Software\WOW64DataView
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1552
                • C:\Windows\system32\reg.exe
                  reg.exe query HKCU\Software\WOW64DataView
                  4⤵
                  • Modifies registry key
                  PID:1720
              • C:\Windows\system32\cmd.exe
                cmd.exe /c reg.exe query HKCU\Software\IfranInfoView
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1648
                • C:\Windows\system32\reg.exe
                  reg.exe query HKCU\Software\IfranInfoView
                  4⤵
                  • Modifies registry key
                  PID:552
              • C:\Windows\system32\cmd.exe
                cmd.exe /c reg.exe add HKCU\Software\WOW64DataView /f
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1356
                • C:\Windows\system32\reg.exe
                  reg.exe add HKCU\Software\WOW64DataView /f
                  4⤵
                  • Modifies registry key
                  PID:1032
              • C:\Windows\system32\cmd.exe
                cmd.exe /c reg.exe add HKCU\Software\WOW64DataView /f /v datetime /t REG_BINARY /d 453E5E4839371F76485F79021318695D1D106C2B2A032F
                3⤵
                  PID:1028
                  • C:\Windows\system32\reg.exe
                    reg.exe add HKCU\Software\WOW64DataView /f /v datetime /t REG_BINARY /d 453E5E4839371F76485F79021318695D1D106C2B2A032F
                    4⤵
                    • Modifies registry key
                    PID:1548
                • C:\Windows\system32\cmd.exe
                  cmd.exe /c reg.exe add HKCU\Software\WOW64DataView /f /v state /t REG_BINARY /d 5661082D3A206A3016407857
                  3⤵
                    PID:1312
                    • C:\Windows\system32\reg.exe
                      reg.exe add HKCU\Software\WOW64DataView /f /v state /t REG_BINARY /d 5661082D3A206A3016407857
                      4⤵
                      • Modifies registry key
                      PID:1296
                  • C:\Windows\system32\cmd.exe
                    cmd.exe /c reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths"
                    3⤵
                      PID:1812
                      • C:\Windows\system32\reg.exe
                        reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths"
                        4⤵
                          PID:1572
                      • C:\Windows\system32\cmd.exe
                        cmd.exe /c reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\chrome.exe" /v "Path"
                        3⤵
                          PID:1064
                          • C:\Windows\system32\reg.exe
                            reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\chrome.exe" /v "Path"
                            4⤵
                              PID:620
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1140,34097304542653841524,21028115001970037882,294316 --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=621--no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9808 /prefetch:1
                            3⤵
                              PID:1396
                              • C:\Windows\system32\cmd.exe
                                cmd.exe /c "echo %windir%"
                                4⤵
                                  PID:688
                                • C:\Windows\system32\cmd.exe
                                  cmd.exe /c "echo %windir%"
                                  4⤵
                                    PID:108

                            Network

                            MITRE ATT&CK Matrix ATT&CK v6

                            Persistence

                            Registry Run Keys / Startup Folder

                            1
                            T1060

                            Defense Evasion

                            Modify Registry

                            2
                            T1112

                            Discovery

                            Remote System Discovery

                            1
                            T1018

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
                              MD5

                              2902de11e30dcc620b184e3bb0f0c1cb

                              SHA1

                              5d11d14a2558801a2688dc2d6dfad39ac294f222

                              SHA256

                              e6a7f1f8810e46a736e80ee5ac6187690f28f4d5d35d130d410e20084b2c1544

                              SHA512

                              efd415cde25b827ac2a7ca4d6486ce3a43cdcc1c31d3a94fd7944681aa3e83a4966625bf2e6770581c4b59d05e35ff9318d9adaddade9070f131076892af2fa0

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                              MD5

                              39c6a52e797c5916a396aa9aef5cae6f

                              SHA1

                              13697e8805d972c149a12ccd8eca47683059fe11

                              SHA256

                              8f983fb322ba788fada3efefa050cb3f1838d563f50312d5429540109dcb46b0

                              SHA512

                              ed7d0c514d993ef6cff139ca2f01ee76729cba9bbb88dac3fe04c1c2bad101925d158744b01bc20c8f74f4899972e8a483d359738ce9a9e258fbb9ce8b1f884e

                            • C:\Users\Admin\AppData\Local\Temp\Damp\keimjdkhqxa.exe
                              MD5

                              1f45bcf1fb8b7ef74a57d19a371f41cf

                              SHA1

                              9b7f346a04f8481c22fb6f8853f76349402a7009

                              SHA256

                              aee116011409a5bec7d356bd8f704df0a361fb029bf20178d49e02607798d9a1

                              SHA512

                              6cdbc392b650420d9238d7400956fa41ec9ede827576b9023b977e232dd18b3dd72f36082fc6cdb5af7f62868b0bd00e9b718522799467c674efb6202a169f9f

                            • \Users\Admin\AppData\Local\Temp\Damp\keimjdkhqxa.exe
                              MD5

                              1f45bcf1fb8b7ef74a57d19a371f41cf

                              SHA1

                              9b7f346a04f8481c22fb6f8853f76349402a7009

                              SHA256

                              aee116011409a5bec7d356bd8f704df0a361fb029bf20178d49e02607798d9a1

                              SHA512

                              6cdbc392b650420d9238d7400956fa41ec9ede827576b9023b977e232dd18b3dd72f36082fc6cdb5af7f62868b0bd00e9b718522799467c674efb6202a169f9f

                            • memory/108-102-0x0000000000000000-mapping.dmp
                            • memory/428-67-0x0000000000000000-mapping.dmp
                            • memory/552-87-0x0000000000000000-mapping.dmp
                            • memory/620-97-0x0000000000000000-mapping.dmp
                            • memory/684-75-0x0000000001E90000-0x0000000001EF4000-memory.dmp
                              Filesize

                              400KB

                            • memory/684-71-0x0000000000000000-mapping.dmp
                            • memory/688-101-0x0000000000000000-mapping.dmp
                            • memory/744-63-0x0000000000000000-mapping.dmp
                            • memory/744-65-0x00000000272F0000-0x0000000027354000-memory.dmp
                              Filesize

                              400KB

                            • memory/748-77-0x0000000000000000-mapping.dmp
                            • memory/792-61-0x0000000000000000-mapping.dmp
                            • memory/816-59-0x000007FEFB7B1000-0x000007FEFB7B3000-memory.dmp
                              Filesize

                              8KB

                            • memory/816-60-0x0000000027210000-0x0000000027274000-memory.dmp
                              Filesize

                              400KB

                            • memory/872-62-0x0000000000000000-mapping.dmp
                            • memory/956-83-0x0000000000EC0000-0x0000000000F24000-memory.dmp
                              Filesize

                              400KB

                            • memory/956-81-0x0000000000B12020-mapping.dmp
                            • memory/956-82-0x0000000000970000-0x0000000000B13000-memory.dmp
                              Filesize

                              1.6MB

                            • memory/956-80-0x0000000000970000-0x0000000000B13000-memory.dmp
                              Filesize

                              1.6MB

                            • memory/1028-90-0x0000000000000000-mapping.dmp
                            • memory/1032-89-0x0000000000000000-mapping.dmp
                            • memory/1064-96-0x0000000000000000-mapping.dmp
                            • memory/1116-76-0x0000000000000000-mapping.dmp
                            • memory/1148-68-0x0000000000000000-mapping.dmp
                            • memory/1284-69-0x0000000000000000-mapping.dmp
                            • memory/1296-93-0x0000000000000000-mapping.dmp
                            • memory/1312-92-0x0000000000000000-mapping.dmp
                            • memory/1344-78-0x0000000000000000-mapping.dmp
                            • memory/1356-88-0x0000000000000000-mapping.dmp
                            • memory/1396-99-0x0000000000083960-mapping.dmp
                            • memory/1396-98-0x0000000000060000-0x00000000000A1000-memory.dmp
                              Filesize

                              260KB

                            • memory/1396-100-0x0000000000060000-0x00000000000A1000-memory.dmp
                              Filesize

                              260KB

                            • memory/1548-91-0x0000000000000000-mapping.dmp
                            • memory/1552-84-0x0000000000000000-mapping.dmp
                            • memory/1572-95-0x0000000000000000-mapping.dmp
                            • memory/1648-86-0x0000000000000000-mapping.dmp
                            • memory/1652-66-0x0000000000000000-mapping.dmp
                            • memory/1720-85-0x0000000000000000-mapping.dmp
                            • memory/1812-94-0x0000000000000000-mapping.dmp
                            • memory/1824-70-0x0000000000000000-mapping.dmp
                            • memory/1952-79-0x0000000000000000-mapping.dmp